Server Component Details | Group: io.mosip.hotlist ---- Artifact: hotlist-service ---- version: 1.2.1.1 ---- Commit ID: 50926c8 Group: io.mosip.admin ---- Artifact: admin-service ---- version: 1.2.1.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-auditmanager-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-auth-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.biosdk ---- Artifact: biosdk-services ---- version: 1.2.0.1 ---- Commit ID: 2a87b3b Group: io.mosip.idrepository ---- Artifact: credential-service ---- version: 1.2.2.0 ---- Commit ID: 50926c8 Group: io.mosip.idrepository ---- Artifact: credential-request-generator ---- version: 1.2.2.0 ---- Commit ID: 50926c8 Group: io.mosip.datashare ---- Artifact: data-share-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.authentication ---- Artifact: authentication-service ---- version: 1.2.1.0 ---- Commit ID: 86640e4 Group: io.mosip.authentication ---- Artifact: authentication-internal-service ---- version: 1.2.1.0 ---- Commit ID: 86640e4 Group: io.mosip.authentication ---- Artifact: authentication-otp-service ---- version: 1.2.1.0 ---- Commit ID: 50926c8 Group: io.mosip.idrepository ---- Artifact: id-repository-identity-service ---- version: 1.2.2.0 ---- Commit ID: 821bac2 Group: io.mosip.kernel ---- Artifact: kernel-keymanager-service ---- version: 1.3.0-beta.3 ---- Commit ID: d748ead Group: io.mosip.kernel ---- Artifact: kernel-masterdata-service ---- version: 1.2.1.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-notification-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-otpmanager-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.pms ---- Artifact: partner-management-service ---- version: 1.3.0-SNAPSHOT ---- Commit ID: d748ead Group: io.mosip.pms ---- Artifact: policy-management-service ---- version: 1.3.0-SNAPSHOT ---- Commit ID: d748ead Group: io.mosip.registrationprocessor ---- Artifact: registration-processor-registration-status-service ---- version: 1.2.0.2 ---- Commit ID: 50926c8 Group: io.mosip.resident ---- Artifact: resident-service ---- version: 1.2.1.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-syncdata-service ---- version: 1.2.1.1 ---- Commit ID: 50926c8 Group: io.mosip.idrepository ---- Artifact: id-repository-vid-service ---- version: 1.2.2.0 ---- Commit ID: 50926c8 Group: io.mosip.esignet ---- Artifact: esignet-service ---- version: 1.4.1 ---- Commit ID: ab88802 | End Points used |
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?sortFieldName={sortFieldName}&sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4&createdToDate=928382
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?model={model}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?policyName={policyName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=partner
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?make={make}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/{policyGroupId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip&pageNo=0&pageSize=4&ftmId=ftm-1212&make=ftm-1212&model=ftm-1212
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}&sortType={sortType}&pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&certificateId=fd0e8be0-9499-448e-9b85-06d5649c3f0e
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/{policyId}/group/{policygroupId}/publish
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationStatus=dismissed&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?apiKeyLabel=InvalidAPIKey
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?pageNo={pageNo}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/oauth/client
Domain: api-internal.qa-core.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/internal/useridPwd
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?sbiId=PMS-SBI
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/trust-chain-certificates?pageNo=0&pageSize=8&issuedTo=PMS_API_CA&issuedBy=PMS_API_CA
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?certificateUploadStatus=not_uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/users/{userId}/notifications-seen-timestamp
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?partnerId={partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=certificateUploadStatus&sortType=desc&certificateUploadStatus=uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?expiryPeriod=15
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?expiryPeriod=10
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/devicedetails/map/remove
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/{partnerId}/policy-group
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?status=1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sbiVersion={sbiVersion}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?status=inactive
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications/{notificationId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=-1&sortType=-1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=apikey&apiKeyName=%2APMS121
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=orgName&sortType=ASC&pageNo=0&pageSize=8&orgName=partner
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?emailAddress=2t63t@@@
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?status=activated
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/apikey/request/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v2/{partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortType=3@@#&pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?deviceId={deviceId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4&createdFromDate=123456
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?orgName={orgName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageNo=111111
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?partnerType={partnerType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?policyGroupName={policyGroupName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?policyName={policyName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?orgName={orgName}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=partnerType&sortType=desc&pageSize=8&partnerType=Auth
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/system-config
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=orgName&pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?model={model}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/trust-chain-certificates
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/auth-partners-policies
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?policyGroupName=testmosip12121
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyName={policyName}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?status=invalid
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageNo=-1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?policyName=""
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?sortFieldName=partnerId&sortType=desc&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip&partnerDomain=AUTH
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?partnerId=%252APMS
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?status=
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?policyName=mosip
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?orgName=%2APMS-1100
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=4&issuedTo=mosip
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=certificateUploadStatus&sortType=asc&certificateUploadStatus=uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?apiKeyLabel=s
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?orgName={orgName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortType=&pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/exists
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/{ftmId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip&ftmId=342342
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/{sbiId}/devices
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/policy-groups
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=asc&pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?status=active&certificateUploadStatus=not_uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?status=deactivated
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?status=active
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageSize=8&isActive=true
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/partner-certificates-details
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?status=active&certificateUploadStatus=uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/all
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/new
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misps/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=partnerId&pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?sortFieldName=_partnerID&sortType=asc&pageNo=1&pageSize=1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?requestDetails={requestDetails}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/apikey/request
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/certificate/upload
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerType=dfdgd
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?status=deactivated
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?pageNo=0&pageSize=2
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip&policyName=PMS-test
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?pageNo={pageNo}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?policyGroupName=mosip
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/certificate-data
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/devicedetails/map
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?certificateUploadStatus=uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?policyName=P@!!cY$$.
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/deviceType/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI&sbiVersion=ab-102-13881
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?partnerId={partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/oidc-clients
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sortType={sortType}&sortFieldName={sortFieldName}&pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses?policyGroupName=""
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=-22
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?pageNo={pageNo}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageNo=1&pageSize=5&status=active
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=16&expiryDate=881718821
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/search
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?partnerId={partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=16&expiryDate=07-04-2025
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/users/user-consent
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/oauth/client/{client_id}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/partnertype/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=weekly&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4&ftmId=ftm-1212&make=ftm-1212&model=ftm-1212
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?status=active&partnerType=AUTH_PARTNER
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/certificate/ca/upload
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?policyGroupName=-12
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?deviceType={deviceType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=2
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?sortFieldName=MOSIP_PMS
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerId=bcbcb
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/uploadcertificate
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/oidc-clients/{clientId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?policyGroupName={policyGroupName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sbiId={sbiId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/getPartnerCertificate/{ftpChipDetailId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?make={make}&model={model}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sbiExpiryStatus={sbiExpiryStatus}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?pageNo=2&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/deviceSubType/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyId={policyId}&policyName={policyName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/roles
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/certificate
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?partnerId={partnerId}&requestDetails={requestDetails}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI&sbiVersion=_%2ASBI
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sbiVersion={sbiVersion}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?partnerId={partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortType=asc&certificateUploadStatus=uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?emailAddress=454646
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerType=2233ddd
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/apikey/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?orgName={orgName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/{sbiId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?status=active&sortFieldName=orgName&sortType=asc
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=apikey
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?sortFieldName=partnerId&sortType=asc&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip&sbiId=12
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?status=%active
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?partnerId=pms-111999
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?mispPartnerId=pms@%111555
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/apikey
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?policyGroupName=
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/{policyId}/group/{policygroupId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&ftmId=12
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?policyId={policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misps/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?isActive=false
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?orgName=PMS
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sbiId={sbiId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?orgName=123@1sse
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyDescription={policyDescription}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v3
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=-1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v2
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/{policyId}/partner/{partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?expiryPeriod=30
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=desc&pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/deviceType/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?policyName=testmosip1212
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=intermediate&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=8&certificateId=777apple123
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=partnerType&sortType=asc&pageSize=8&partnerType=Auth
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/apikey/request/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/policy/map
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v3?status=approved&partnerType=FTM_Provider
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/config/{key}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/clientidsecretkey
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?apiKeyLabel={apiKeyLabel}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageSize=-12
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/trust-chain-certificates/4e6292d7-7604-44e3-ab4f-58a18c53dc9e/certificateFile
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?orgName={orgName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners/{partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/email/verify
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/{deviceId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationStatus=active&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misp-licenses/{partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=16&issuedBy=mosip
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/apikey/{apiKey}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?expiryPeriod={expiryPeriod}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?make={make}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=misp
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&certificateId=777apple@%123
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/pms-111557/policy-group
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=a2a33
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/generate/apikey
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?pageNo=-22&pageSize=2
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyGroupName={policyGroupName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerId=-dndn333
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/policy/{mappingkey}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=-4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?pageNo={pageNo}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?pageNo=1&pageSize=-1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4&createdFromDate=07-04-2025
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?partnerId={partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/policygroup/{policygroupName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=root&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyId={policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4&createdToDate=07-04-2025
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/{policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/contact/add
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&apiKeyName=12
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?deviceSubType={deviceSubType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?policyName=PMS-test
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/{deviceDetailId}/approval
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?make={make}&model={model} | |||||
|---|---|---|---|---|---|---|---|---|
Server Errors No server errors | ||||||||
Captcha Enabled false | ||||||||
| Partner Management Service API Test ---- Report Date: 2026-02-03 ---- Tested Environment: qa-core ---- Commit Id is: b1a7b814 & Branch Name is:release-1.3.x | ||||||||
| Test Scenario | # Total | # Passed | # Skipped | # Failed | # Ignored | # Known_Issues | Execution Time (HH:MM:SS) | |
| CreatePolicyGroup | 20 | 20 | 0 | 0 | 0 | 0 | 00:00:03 | |
| GetPolicyGroup | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdatePolicyGroup | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivatePolicyGroupBeforePolicyCreation | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DefinePolicy | 29 | 29 | 0 | 0 | 0 | 0 | 00:00:06 | |
| DefineMISPPolicy | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DefineDataSharePolicy | 25 | 25 | 0 | 0 | 0 | 0 | 00:00:04 | |
| UpdatePolicy | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdatePolicyStatus | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PublishPolicy | 12 | 12 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllActivePolicyGroups | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPolicy | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SearchPolicy | 20 | 20 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PrintPartner | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCACertificatePrintPartner | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadPartnerCertificatePrintPartner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdatePrintPartner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPrintPartnerDetails | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerWithoutPartnerRegister | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedPartnerIdBeforePartnerCreate | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreatePartner | 19 | 19 | 0 | 0 | 0 | 0 | 00:00:03 | |
| MISPPartnerV3 | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:04 | |
| MISPPartnerV3NegativeScenarios | 33 | 33 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCertificateMISPCASUBCA | 16 | 16 | 0 | 0 | 0 | 0 | 00:00:14 | |
| UploadMISPPartnerCertificate | 8 | 8 | 0 | 0 | 0 | 0 | 00:00:16 | |
| LinkPolicyGroupToMISPPartner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| LinkPolicyGroupToMISPPartnerNegTC | 21 | 21 | 0 | 0 | 0 | 0 | 00:00:01 | |
| MISPPartnerExists | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| MISPPartnerExistsNegTC | 8 | 8 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListofPartnersAssociatedwithLoggedinUser | 10 | 10 | 0 | 0 | 0 | 0 | 00:00:16 | |
| GetListofPartnersAssociatedwithLoggedinUserNegSce | 10 | 10 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreatePartner_Online_Verification_Partner | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerWithoutPartnerCertifcates | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| VerifyPartnersEmail | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerExpiringCertificateBeforeCertificateUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCACertificate | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:04 | |
| GetAllCertificateBeforeCACertificateUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalPartnerCertificatesBeforeCertificateUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadPartnerCertificate | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:07 | |
| GetPartnerCertificate | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllCertificate | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdatePartner | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCACertificate_Online_Verification_Partner | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:02 | |
| UploadPartnerCertificate_Online_Verification_Partner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:02 | |
| GetPartnerDetails_Online_Verification_Partner | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerCertificate_Online_Verification_Partner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedPartnerId | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedPartnerIdWithoutAuthentication | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerBeforePolicyMapping | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllRequestedPolicyBeforeMapping | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AddAdditionalContact | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| partnerPolicyMapping | 14 | 14 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AddBioExtractors | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectMappingKey | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingKey | 10 | 10 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllRequestedPolicy | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllRequestedPolicyAuthvalidations | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedAuthPartnerPolicy | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedAuthPartnerPolicyAuthValidations | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerBeforeApikeyGenerated | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GenerateApiKey | 8 | 8 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ActivateDeactivatePartnerApiKey | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:01 | |
| InsertDBData | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartner | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerAfterDeactive | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllPartnerPolicyRequest | 16 | 16 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllPartnerPolicyRequestNegativeScenarios | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfPartners | 51 | 51 | 0 | 0 | 0 | 0 | 00:00:30 | |
| GetDetailsOfPartner | 8 | 8 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfPolicies | 21 | 21 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfPoliciesRequest | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllOidcClientBeforeOIDCCreation | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OAuthClient | 11 | 11 | 0 | 0 | 0 | 0 | 00:00:02 | |
| GetAllOauthClient | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreateOIDCClient | 54 | 54 | 0 | 0 | 0 | 0 | 00:00:14 | |
| UpdateOIDCAuthClient | 18 | 18 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateOIDCClientV2 | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateOIDCClientNegTC | 12 | 12 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOIDCClient | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOIDCClientNegTC | 14 | 14 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOIDCClientByClientId | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOIDCClientByClientIdNegTC | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateOAuthClient | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllOidcClient | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllOidcClientWithoutAuthentication | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateOIDCClient | 11 | 11 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllOidcClientAfterDeactivateOfOIDC | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetConfiguration | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetUserConsentBeforeConsentGiven | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| saveUserConsent | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetUserConsent | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalPartnerCertificates | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreatePartner_MISP_Provider | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCACertificate_MISP_Provider | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:06 | |
| UploadPartnerCertificate_MISP_Provider | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:10 | |
| GetPartnerDetails_MISP_Provider | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerCertificate_MISP_Provider | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreateDeviceDetail | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectDeviceDetail | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveDeviceDetail | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateDeviceDetail | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeviceDetailsFilter | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| createSearchDeviceType | 11 | 11 | 0 | 0 | 0 | 0 | 00:00:01 | |
| createSearchDeviceDetails | 11 | 11 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfAllSBIBeforeAddingSBI | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SaveSecureBiometricInterfaceCreateDto | 11 | 11 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectSecureBiometricInterface | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveSecureBiometricInterface | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateSecureBiometricInterface | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| createSearchSecureBiometric | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedDeviceProviderIds | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedDeviceProviderIdsNegativeScenarios | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateSBIID | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetSbiDetailsList | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeviceTypeFilter | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeviceSubTypeFilter | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SaveDeviceDetails | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfAllSBI | 18 | 18 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ServiceToFilterSBI | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| MapDeviceWithSBI | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RemoveMapDeviceWithSBI | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingDeviceToSbi | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingDeviceToSbiNegativeScenarios | 13 | 13 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectMappingDeviceToSbi | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectMappingDeviceToSbiwhichisRejected | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectMappingDeviceToSbiNegativeScenarios | 32 | 32 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingDeviceToSbiwhichisRejected | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllDeviceListMappedWithSbi | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllDeviceListMappedWithSbiNegativeScenarios | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateSBIwhichisPendingforApproval | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnersPolicy | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllPolicyGroup | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:07 | |
| CreateSearchPolicyGroup | 13 | 13 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PolicyGroupFilter | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetValueForConfigKey | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PartnerFilter | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SearchPartnerApiKey | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:04 | |
| SearchPartnerApiRequestKey | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:05 | |
| PartnerApiKeyRequestFilter | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreateSearchPartnerType | 19 | 19 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedFtmProvider | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedFtmProviderNegativeScenarios | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListAllFTMChipNegativeScenarios | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreateFtmChipDetails | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateFtpChipDetail | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacteNegativeScenariosBeforeUploadCert | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateFtmwhichisPendingforCertUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacteforPendingforCertUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCertificateOfFtpChip | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateFtmwhichisPendingforApproval | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveFTMChipDetail | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectFtpChipDetail | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetFTPChipDetail | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListAllFTMChip | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacte | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacteNegativeScenarios | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfFtmChip | 15 | 15 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfFtmChipNegativeScenarios | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfAllSBINegativeScenarios | 14 | 14 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfAllDevice | 25 | 25 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetCountOfFtm | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllSystemConfigs | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllRootCertificate | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfApiKey | 17 | 17 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DownloadRootCertificate | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GenerateMISPPartnerLicense | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GenerateMISPPartnerLicenseNegativeScenarios | 20 | 20 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateMISPLicense | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateMISPPartner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetMISPPartnerLicense | 29 | 29 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetMISPPartnerLicenseNegTC | 41 | 41 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetMISPPartnerLicenseByPartnerId | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetMISPPartnerLicenseByPartnerIdNegTC | 8 | 8 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SearchMispLicense | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| FilterMispLicense | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerApiKeyRequest | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetBioExtractors | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreateBioExtractors | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| MapPartnerAndPolicytoCredentialType | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPolicyforMappedPartnerAndCredentialtype | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetRoles | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ActivateDeactivatePartner | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetApiKeyRequests | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuditLogGenerateApiKey | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:03 | |
| GetPolicyForApiKey | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdatePolicyAgainstApiKey | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuditLogPartnerApiKey_ | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:03 | |
| UpdatePolicyGroupForPartner | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuditLogUpdatePolicyGroupForPartner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:03 | |
| DBValidator | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RegenerateMISPPartnerLicense | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RegenerateMISPPartnerLicenseNegTC | 19 | 19 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateMISPPartnerLicense | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateMISPPartnerLicenseNegTC | 10 | 10 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateDevice | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateDeviceNegativeScenarios | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateSBIWithAssociatedDevices | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateSBIWithAssociatedDevicesNegativeScenarios | 20 | 20 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingDeviceToSbiwhenSBIisDeactivated | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateFtm | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateFtmNegativeScenarios | 18 | 18 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacteAfterDeactiveFtm | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivatePolicy | 13 | 13 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivatePolicyGroup | 17 | 17 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllNotifications | 59 | 59 | 0 | 0 | 0 | 0 | 00:00:02 | |
| DismissNotificationNegativeScenarios | 19 | 19 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateNotificationSeenTimestamp | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateNotificationSeenTimestampNegativeScenarios | 19 | 19 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetNotificationsSeenTimestamp | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetNotificationsSeenTimestampNegativeScenarios | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerExpiringCertificate | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerExpiringCertificateNegativeScenarios | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetRootIntermediateExpiringCertificate | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetRootIntermediateExpiringCertificateNegativeScenarios | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerV2 | 16 | 16 | 0 | 0 | 0 | 0 | 00:00:04 | |
| GetAllApiKeyForAuthPartnerV2NegativeScenarios | 14 | 14 | 0 | 0 | 0 | 0 | 00:00:01 | |
| Total | 1,485 | 1,485 | 0 | 0 | 0 | 0 | 00:04:16 | |
| TestCase Number | TestCase Description | Execution Time (HH:MM:SS) |
|---|---|---|
| CreatePolicyGroup — Passed | ||
| TC_PMS_definePolicyGroup_17 | Validate that a policy group is successfully created when it is active | 00:00:01 |
| TC_PMS_definePolicyGroup_11 | Validate that a policy group is successfully created when PMS has a draft policy | 00:00:01 |
| TC_PMS_definePolicyGroup_10 | Validate that a policy group is successfully created when PMS has a published policy | 00:00:01 |
| TC_PMS_definePolicyGroup_12 | Validate that a policy group is successfully created after deleting any existing groups before policy creation | 00:00:01 |
| TC_PMS_definePolicyGroup_09 | Validate that a policy group is successfully created for deactivating a policy in PMS | 00:00:01 |
| TC_PMS_definePolicyGroup_16 | Validate that a policy group is successfully created using AuthTypeToken | 00:00:01 |
| TC_PMS_definePolicyGroup_15 | Validate that a policy group is successfully created or updated for policy updates in PMS | 00:00:01 |
| TC_PMS_definePolicyGroup_01 | Validate that a policy group is successfully created with all valid inputs | 00:00:02 |
| TC_PMS_definePolicyGroup_02 | Validate that policy group creation fails when the policy group already exists | 00:00:01 |
| TC_PMS_definePolicyGroup_08 | Validate that a policy group is successfully created with valid inputs for negative test scenarios | 00:00:01 |
| TC_PMS_definePolicyGroup_20 | Validate that a MISP policy group is successfully created with all valid inputs | 00:00:01 |
| TC_PMS_definePolicyGroup_04 | Validate that policy group creation fails when the description input parameter is missing | 00:00:01 |
| TC_PMS_definePolicyGroup_05 | Validate that policy group creation fails when the name input parameter is missing | 00:00:01 |
| TC_PMS_definePolicyGroup_06 | Validate that policy group creation fails when the requestTime input parameter is missing | 00:00:01 |
| TC_PMS_definePolicyGroup_03 | Validate that policy group creation fails when the request time is set to a past date | 00:00:01 |
| TC_PMS_definePolicyGroup_14 | Validate that a policy group is successfully updated for a partner with all valid inputs | 00:00:01 |
| TC_PMS_definePolicyGroup_07 | Validate that policy group creation fails when authentication is not provided | 00:00:01 |
| TC_PMS_definePolicyGroup_21 | Validate that a policy group is successfully created when PMS is deactivated | 00:00:01 |
| TC_PMS_definePolicyGroup_22 | Validate that a policy group is successfully created and then deactivated in PMS | 00:00:01 |
| TC_PMS_definePolicyGroup_13 | Validate that a policy group is successfully created when retrieving API keys for a deactivated partner | 00:00:01 |
| GetPolicyGroup — Passed | ||
| TC_PMS_getPolicyGroup_01 | Validate that all policy groups can be retrieved successfully for valid inputs | 00:00:01 |
| TC_PMS_getPolicyGroup_02 | Validate that retrieving a policy group fails when an invalid policyGroupId is provided | 00:00:01 |
| UpdatePolicyGroup — Passed | ||
| TC_PMS_updatePolicyGroup_02 | Validate that a policy group can be updated successfully with valid inputs | 00:00:01 |
| TC_PMS_updatePolicyGroup_04 | Validate that updating a policy group fails when an invalid policy group ID is provided | 00:00:01 |
| TC_PMS_updatePolicyGroup_05 | Validate that updating a policy group fails when the policy group description is missing | 00:00:01 |
| TC_PMS_updatePolicyGroup_07 | Validate that updating a policy group fails when the active status is missing | 00:00:01 |
| TC_PMS_updatePolicyGroup_06 | Validate that updating a policy group fails when the policy group name is missing | 00:00:01 |
| TC_PMS_updatePolicyGroup_03 | Validate that a policy group can be activated successfully with valid inputs | 00:00:01 |
| TC_PMS_updatePolicyGroup_01 | Validate that a policy group can be deactivated successfully with valid inputs | 00:00:01 |
| DeactivatePolicyGroupBeforePolicyCreation — Passed | ||
| TC_PMS_DeactivatePolicyGroupBeforePolicyCreation_01 | Validate that a policy group can be successfully deactivated before any policies are created within it | 00:00:01 |
| DefinePolicy — Passed | ||
| TC_PMS_definePolicy_29 | Validate that a policy is successfully created when the PMS is in draft state | 00:00:01 |
| TC_PMS_definePolicy_31 | Validate that a policy is successfully created when the PMS has a policy in In-Progress mapping state | 00:00:01 |
| TC_PMS_definePolicy_28 | Validate that a policy is successfully created when the PMS is in a published state | 00:00:01 |
| TC_PMS_definePolicy_30 | Validate that a policy is successfully created when the PMS has a rejected policy | 00:00:01 |
| TC_PMS_definePolicy_06 | Validate that policy creation fails when the AuthTypeToken is left blank | 00:00:01 |
| TC_PMS_definePolicy_05 | Validate that policy creation fails when an invalid AuthTypeToken is provided | 00:00:01 |
| TC_PMS_definePolicy_03 | Validate that policy creation fails when the AuthTypeToken value is null | 00:00:01 |
| TC_PMS_definePolicy_04 | Validate that a policy is successfully created with AuthTypeToken configured | 00:00:01 |
| TC_PMS_definePolicy_08 | Validate that policy creation fails when the AuthTypeToken contains only spaces | 00:00:01 |
| TC_PMS_definePolicy_27 | Validate that a policy is successfully created when the PMS is deactivated | 00:00:01 |
| TC_PMS_definePolicy_02 | Validate that a policy is successfully created and can be used to get an API key even when associated SBIs are deactivated | 00:00:01 |
| TC_PMS_definePolicy_01 | Validate that a policy is successfully created when all inputs are valid | 00:00:01 |
| TC_PMS_definePolicy_10 | Validate that policy creation fails when DemoAuth uses an existing policy | 00:00:01 |
| TC_PMS_definePolicy_19 | Validate that policy creation fails when the AuthTokenType input parameter is missing | 00:00:01 |
| TC_PMS_definePolicy_18 | Validate that policy creation fails when the AuthType input parameter is missing | 00:00:01 |
| TC_PMS_definePolicy_16 | Validate that policy creation fails when the policy description input parameter is missing | 00:00:01 |
| TC_PMS_definePolicy_17 | Validate that policy creation fails when a mandatory input parameter is missing | 00:00:01 |
| TC_PMS_definePolicy_15 | Validate that policy creation fails when the policy name input parameter is missing | 00:00:01 |
| TC_PMS_definePolicy_21 | Validate that policy creation fails when the policyGroupName input parameter is missing | 00:00:01 |
| TC_PMS_definePolicy_22 | Validate that policy creation fails when the policyType input parameter is missing | 00:00:01 |
| TC_PMS_definePolicy_14 | Validate that policy creation fails when the specified policy group is inactive | 00:00:01 |
| TC_PMS_definePolicy_13 | Validate that policy creation fails when the specified policy group does not exist | 00:00:01 |
| TC_PMS_definePolicy_09 | Validate that a policy is successfully created with a random token type | 00:00:01 |
| TC_PMS_definePolicy_11 | Validate that policy update fails when Demo authentication is removed | 00:00:01 |
| TC_PMS_definePolicy_26 | Validate that a policy is successfully created using Demo authentication | 00:00:01 |
| TC_PMS_definePolicy_24 | Validate that policy creation fails when the AuthTokenType is invalid | 00:00:01 |
| TC_PMS_definePolicy_25 | Validate that policy creation fails when the AuthTokenType parameter is missing | 00:00:01 |
| TC_PMS_definePolicy_23 | Validate that policy creation fails when the AuthTokenType is null | 00:00:01 |
| TC_PMS_definePolicy_07 | Validate that policy creation fails when the AuthTypeToken is not provided | 00:00:01 |
| DefineMISPPolicy — Passed | ||
| TC_PMS_DefineMISPPolicy_01 | Validate that a MISP policy is successfully created when all inputs are valid | 00:00:01 |
| DefineDataSharePolicy — Passed | ||
| TC_PMS_defineDataSharePolicy_01 | Validate that defining a data share policy succeeds for all valid inputs | 00:00:01 |
| TC_PMS_defineDataSharePolicy_03 | Validate that updating a data share policy succeeds for all valid inputs | 00:00:01 |
| TC_PMS_defineDataSharePolicy_02 | Validate that defining a data share policy succeeds for all valid API key request | 00:00:01 |
| TC_PMS_defineDataSharePolicy_23 | Validate that defining a data share policy fails when an custom attribute name is provided | 00:00:01 |
| TC_PMS_defineDataSharePolicy_24 | Validate that the creation of a data share policy is cancelled successfully when the operation is aborted before submission | 00:00:01 |
| TC_PMS_defineDataSharePolicy_22 | Validate that defining a data share policy fails when an invalid encryptionType is provided | 00:00:01 |
| TC_PMS_defineDataSharePolicy_07 | Validate that defining a data share policy fails when the associated policy group is inactive | 00:00:01 |
| TC_PMS_defineDataSharePolicy_16 | Validate that defining a data share policy succeeds when individual biometrics attributes are included | 00:00:01 |
| TC_PMS_defineDataSharePolicy_14 | Validate that defining a data share policy fails when a removed attribute is included in the request | 00:00:01 |
| TC_PMS_defineDataSharePolicy_04 | Validate that the status of a data share policy can be checked successfully for valid inputs | 00:00:01 |
| TC_PMS_defineDataSharePolicy_05 | Validate that defining a data share policy fails when mandatory fields are not provided | 00:00:01 |
| TC_PMS_defineDataSharePolicy_17 | Validate that defining a data share policy succeeds when the zipcode attribute is included | 00:00:01 |
| TC_PMS_defineDataSharePolicy_06 | Validate that defining a data share policy fails when a duplicate policy name is provided | 00:00:01 |
| TC_PMS_defineDataSharePolicy_15 | Validate that defining a data share policy fails when fields contain only space values formatting | 00:00:01 |
| TC_PMS_defineDataSharePolicy_08 | Validate that defining a data share policy fails when an invalid policy group name is provided | 00:00:01 |
| TC_PMS_defineDataSharePolicy_09 | Validate that defining a data share policy fails when an invalid policy type is provided | 00:00:01 |
| TC_PMS_defineDataSharePolicy_12 | Validate that defining a data share policy fails when the policy group name is missing | 00:00:01 |
| TC_PMS_defineDataSharePolicy_13 | Validate that defining a data share policy fails when the policy type is missing | 00:00:01 |
| TC_PMS_defineDataSharePolicy_11 | Validate that defining a data share policy fails when the policy description is missing | 00:00:01 |
| TC_PMS_defineDataSharePolicy_10 | Validate that defining a data share policy fails when the policy name is missing | 00:00:01 |
| TC_PMS_defineDataSharePolicy_21 | Validate that defining a data share policy succeeds when the shareDomain is provided with a valid HTTPS URL | 00:00:01 |
| TC_PMS_defineDataSharePolicy_19 | Validate that defining a data share policy fails when typeOfShare is set to an invalid value Direct | 00:00:01 |
| TC_PMS_defineDataSharePolicy_20 | Validate that defining a data share policy fails when the typeOfShare attribute is removed from the request | 00:00:01 |
| TC_PMS_defineDataSharePolicy_18 | Validate that defining a data share policy fails when the typeOfShare field contains only space values | 00:00:01 |
| TC_PMS_defineDataSharePolicy_25 | Validate that defining a data share policy fails when the policyId is missing | 00:00:01 |
| UpdatePolicy — Passed | ||
| TC_PMS_createUpdatePolicy_06 | Validate that updating a policy fails when an invalid policy ID is provided | 00:00:01 |
| TC_PMS_createUpdatePolicy_02 | Validate that updating a policy fails when an invalid policy ID is provided | 00:00:01 |
| TC_PMS_createUpdatePolicy_03 | Validate that updating a policy fails when an invalid policy group name is provided | 00:00:01 |
| TC_PMS_createUpdatePolicy_07 | Validate that updating a policy fails when the authentication token type is missing | 00:00:01 |
| TC_PMS_createUpdatePolicy_05 | Validate that updating a policy fails when the policy description is missing | 00:00:01 |
| TC_PMS_createUpdatePolicy_04 | Validate that updating a policy fails when the policy name is missing | 00:00:01 |
| TC_PMS_createUpdatePolicy_08 | Validate that updating a policy fails when the policy group name is missing | 00:00:01 |
| UpdatePolicyStatus — Passed | ||
| TC_PMS_UpdatePolicyStatus_04 | Validate that activating a policy fails when invalid inputs are provided | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_01 | Validate that a policy can be deactivated successfully using valid authentication details | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_03 | Validate that a data share policy can be deactivated successfully with valid inputs | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_08 | Validate that updating a policy status fails when the status value is missing | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_07 | Validate that updating a policy status fails when an invalid policy group ID is provided | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_05 | Validate that updating the status of a policy fails when an invalid policy ID is provided | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_06 | Validate that updating a policy status fails when an invalid status value is provided | 00:00:01 |
| PublishPolicy — Passed | ||
| TC_PMS_publishPolicy_10 | Validate that a partner can publish a data share policy successfully with all valid inputs | 00:00:01 |
| TC_PMS_publishPolicy_12 | Validate that a policy can be published successfully when associated policy mappings are in progress | 00:00:01 |
| TC_PMS_publishPolicy_11 | Validate that a policy can be published successfully even when associated policy mappings are rejected | 00:00:01 |
| TC_PMS_publishPolicy_01 | Validate that a policy can be published successfully with all valid inputs | 00:00:01 |
| TC_PMS_publishPolicy_08 | Validate that publishing a policy succeeds with all valid inputs intended for negative test scenarios | 00:00:01 |
| TC_PMS_publishPolicy_09 | Validate that publishing a policy succeeds for a deactivated policy group intended for negative test scenarios | 00:00:01 |
| TC_PMS_publishPolicy_07 | Validate that a policy can be published successfully even when associated with a deactivated policy group | 00:00:01 |
| TC_PMS_publishPolicy_03 | Validate that publishing a policy fails when the policy has already been published | 00:00:01 |
| TC_PMS_publishPolicy_05 | Validate that publishing a policy fails when an invalid policy ID is provided | 00:00:01 |
| TC_PMS_publishPolicy_04 | Validate that publishing a policy fails when an invalid policy group ID is provided | 00:00:01 |
| TC_PMS_publishMISPPolicy_02 | Validate that a MISP policy can be published successfully with all valid inputs | 00:00:01 |
| TC_PMS_publishPolicy_06 | Validate that publishing a policy fails when invalid authentication details are provided | 00:00:01 |
| GetAllActivePolicyGroups — Passed | ||
| TC_PMS_GetAllActivePolicyGroups_01 | Validate that all active policy groups are successfully retrieved with valid inputs | 00:00:01 |
| TC_PMS_GetAllActivePolicyGroups_03 | Validate that retrieving all active policy groups fails when an invalid authentication is provided | 00:00:01 |
| TC_PMS_GetAllActivePolicyGroups_02 | Validate that retrieving all active policy groups fails when authentication is not provided | 00:00:01 |
| GetPolicy — Passed | ||
| TC_PMS_getPolicy_01 | Validate that all policies can be retrieved successfully for valid inputs | 00:00:01 |
| TC_PMS_getPolicy_02 | Validate that retrieving a policy fails when an invalid policyId is provided | 00:00:01 |
| SearchPolicy — Passed | ||
| TC_PMS_createSearchPartner_01 | Validate that policies can be searched and retrieved successfully for all valid inputs | 00:00:01 |
| TC_PMS_createSearchPartner_03 | Validate that policies can be searched successfully using only filter criteria | 00:00:01 |
| TC_PMS_createSearchPartner_05 | Validate that policies can be searched successfully using only pagination | 00:00:01 |
| TC_PMS_createSearchPartner_04 | Validate that policies can be searched successfully using only sorting | 00:00:01 |
| TC_PMS_createSearchPartner_06 | Validate that policies can be searched successfully when the type contains a given value sorted in ascending order | 00:00:01 |
| TC_PMS_createSearchPartner_07 | Validate that policies can be searched successfully when the type contains a given value sorted in descending order | 00:00:01 |
| TC_PMS_createSearchPartner_09 | Validate that policies can be searched successfully when the type equals a given value sorted in ascending order | 00:00:01 |
| TC_PMS_createSearchPartner_08 | Validate that policies can be searched successfully when the type equals a given value sorted in descending order | 00:00:01 |
| TC_PMS_createSearchPartner_10 | Validate that policies can be searched successfully when the type starts with a given value sorted in ascending order | 00:00:01 |
| TC_PMS_createSearchPartner_11 | Validate that policies can be searched successfully when the type starts with a given value sorted in descending order | 00:00:01 |
| TC_PMS_createSearchPartner_15 | Validate that searching policies fails when an invalid column name is provided | 00:00:01 |
| TC_PMS_createSearchPartner_20 | Validate that searching policies fails when an invalid sort field is provided | 00:00:01 |
| TC_PMS_createSearchPartner_18 | Validate that searching policies fails when an invalid sort type is provided | 00:00:01 |
| TC_PMS_createSearchPartner_12 | Validate that searching policies returns fails when an invalid value is used with the contains filter | 00:00:01 |
| TC_PMS_createSearchPartner_13 | Validate that searching policies returns fails when an invalid value is used with the equals filter | 00:00:01 |
| TC_PMS_createSearchPartner_14 | Validate that searching policies returns fails when an invalid value is used with the starts with filter | 00:00:01 |
| TC_PMS_createSearchPartner_16 | Validate that searching policies fails when the column name is missing | 00:00:01 |
| TC_PMS_createSearchPartner_21 | Validate that searching policies fails when the sort field is missing | 00:00:01 |
| TC_PMS_createSearchPartner_19 | Validate that searching policies fails when the sort type is missing | 00:00:01 |
| TC_PMS_createSearchPartner_17 | Validate that searching policies fails when the type filter is missing | 00:00:01 |
| PrintPartner — Passed | ||
| TC_PMS_createPartnerSelfRegistration_printpartner_01 | Validate that a partner’s self-registration details can be printed successfully for all valid inputs | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_02 | Validate that partner self-registration fails when a duplicate email is provided | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_03 | Validate that partner self-registration fails when the Partner ID contains only spaces | 00:00:01 |
| UploadCACertificatePrintPartner — Passed | ||
| TC_PMS_uploadCACert_printpartner_01 | Validate that CA certificates can be uploaded successfully with all valid inputs | 00:00:01 |
| TC_PMS_uploadCACert_printpartner_02 | Upload valid Intermediate Certificate for Print Partner | 00:00:01 |
| UploadPartnerCertificatePrintPartner — Passed | ||
| TC_PMS_UploadPartnerCert_Printpartner_01 | Validate that certificates can be uploaded successfully with all valid inputs | 00:00:01 |
| UpdatePrintPartner — Passed | ||
| TC_PMS_UpdatePrintPartner_01 | Validate that a partners print details can be updated successfully with all valid inputs | 00:00:01 |
| GetPrintPartnerDetails — Passed | ||
| TC_PMS_GetPrintPartnerDetails_01 | Validate that partner details can be retrieved successfully for all valid inputs | 00:00:01 |
| GetAllApiKeyForAuthPartnerWithoutPartnerRegister — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerWithoutPartnerRegister_01 | Validate that retrieving API keys fails when the partner is not registered | 00:00:01 |
| GetAllApprovedPartnerIdBeforePartnerCreate — Passed | ||
| TC_PMS_GetAllApprovedAuthPartnerIdNegative_03 | Validate that retrieving approved authenticated partner IDs fails when the partner has not been created yet | 00:00:01 |
| CreatePartner — Passed | ||
| TC_PMS_createPartnerSelfRegistration_10 | Validate that partner self registration and API key retrieval work correctly even when associated with a deactivated partner using valid inputs | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_11 | Validate that partner self registration fails when the policy name already exists | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_14 | Validate that partner self registration fails when attempting to register a partner that already exists with invalid details | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_09 | Validate that partner self registration fails when the partner ID is deactivated | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_13 | Validate that partner self registration fails when the selected policy group is inactive | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_16 | Validate that partner self registration fails when the Partner ID input parameter is missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_17 | Validate that partner self registration fails when the address input parameter is missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_18 | Validate that partner self registration fails when the contact number input parameter is missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_19 | Validate that partner self registration fails when the email ID input parameter is missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_20 | Validate that partner self registration fails when the partner type input parameter is missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_12 | Validate that partner self registration fails when the partner ID contains spaces | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_15 | Validate that a partner’s policy group can be successfully updated when all inputs are valid | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_01 | Validate that a partner successfully completes self registration when all required inputs are valid | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_06 | Validate that a device provider successfully completes partner self registration with valid inputs | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_07 | Validate that an FTM provider successfully completes partner self registration when all inputs are valid | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_03 | Validate that partner self registration fails when the email address is missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_04 | Validate that partner self registration fails when the request time is missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_05 | Validate that partner self registration fails when the request time is set to a past date | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_02 | Validate that partner self registration fails when the same email address is reused | 00:00:01 |
| MISPPartnerV3 — Passed | ||
| TC_PMS_CreateMISPPartnerRegistration_01 | Validate that a MISP partner is successfully registered with all required valid inputs as part of a smoke test | 00:00:01 |
| TC_PMS_CreateMISPPartnerRegistration_02 | Validate that the API returns an error when attempting to register a MISP partner with an empty policy group | 00:00:01 |
| TC_PMS_CreateMISPPartnerRegistration_09 | Validate that the API returns an error or handles appropriately when attempting to register a MISP partner without providing a policy ID as part of a smoke test | 00:00:01 |
| TC_PMS_CreateMISPPartnerRegistration_04 | Validate that a MISP partner can be successfully registered when the address field contains the maximum allowed number of characters | 00:00:01 |
| TC_PMS_CreateMISPPartnerRegistration_05 | Validate that a MISP partner can be successfully registered when the contact number field contains the maximum allowed digits | 00:00:01 |
| TC_PMS_CreateMISPPartnerRegistration_06 | Validate that a MISP partner can be successfully registered when the email ID field contains the maximum allowed characters | 00:00:01 |
| TC_PMS_CreateMISPPartnerRegistration_08 | Validate that the API handles MISP partner registration successfully even when the certificate is not uploaded as part of a smoke test | 00:00:01 |
| TC_PMS_CreateMISPPartnerRegistration_03 | Validate that the API returns an error or handles appropriately when attempting to register a MISP partner without providing a policy group as part of a smoke test | 00:00:01 |
| TC_PMS_CreateMISPPartnerRegistration_07 | Validate that a MISP partner can be successfully registered when the language code is set to Arabic | 00:00:01 |
| MISPPartnerV3NegativeScenarios — Passed | ||
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_16 | Validate that the API returns an error when attempting to register a MISP partner with -1 provided as the email ID | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_12 | Validate that the API returns an error when attempting to register a MISP partner with an address field containing more than 2000 words | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_10 | Validate that the API returns an error when attempting to register a MISP partner with an empty address field | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_13 | Validate that the API returns an error when attempting to register a MISP partner with an empty contact number | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_08 | Validate that the API returns an error when attempting to register a MISP partner with an empty email address | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_06 | Validate that the API returns an error when attempting to register a MISP partner with an empty organization name | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_02 | Validate that the API returns an error when attempting to register a MISP partner with an empty partner ID | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_17 | Validate that the API returns an error when attempting to register a MISP partner with an empty partner type | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_25 | Validate that the API returns an error when attempting to register a MISP partner with an empty request ID | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_21 | Validate that the API returns an error when attempting to register a MISP partner with an empty request time | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_19 | Validate that the API returns an error when attempting to register a MISP partner with an empty language code | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_09 | Validate that the API returns an error when attempting to register a MISP partner with an invalid email address format | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_18 | Validate that the API returns an error when attempting to register a MISP partner with an invalid partner type | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_04 | Validate that the API returns an error when attempting to register a MISP partner with an invalid policy group | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_22 | Validate that the API returns an error when attempting to register a MISP partner using an invalid request ID | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_28 | Validate that the API returns an error when attempting to register a MISP partner with an invalid version value | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_20 | Validate that the API returns an error when attempting to register a MISP partner with an invalid language code | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_07 | Validate that the API returns an error when attempting to register a MISP partner with the organization name field missing from the request | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_03 | Validate that the API returns an error when attempting to register a MISP partner with the partner ID field missing from the request | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_11 | Validate that the API returns an error when attempting to register a MISP partner with a null value in the address field | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_05 | Validate that the API returns an error when attempting to register a MISP partner with special characters in the policy group field | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_30 | Validate that the API returns an error when attempting to register a MISP partner using an unsupported version value 0 | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_29 | Validate that the API returns an error when attempting to register a MISP partner using an unsupported version value 1 | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_32 | Validate that the API returns an error when attempting to register a MISP partner using an already existing email ID | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_33 | Validate that the API returns an error when attempting to register a MISP partner using an already existing Partner ID | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_14 | Validate that the API returns an error when attempting to register a MISP partner with a contact number exceeding the maximum allowed length | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_15 | Validate that the API returns an error when attempting to register a MISP partner with an email ID exceeding the maximum allowed length | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_24 | Validate that the API returns an error when attempting to register a MISP partner with a null request ID | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_27 | Validate that the API returns an error when attempting to register a MISP partner with a null version value | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_01 | Validate that the API returns an error when attempting to register a MISP partner without providing an access token | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_23 | Validate that the API returns an error when attempting to register a MISP partner without providing a request ID | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_31 | Validate that the API returns an error when attempting to register a MISP partner without providing the request time | 00:00:01 |
| TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_26 | Validate that the API returns an error when attempting to register a MISP partner without providing a version | 00:00:01 |
| UploadCertificateMISPCASUBCA — Passed | ||
| TC_PMS_UploadCertificateMISPCASUBCA_11 | Upload valid CA certificate for Misp Partner 111550 | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_13 | Upload valid CA certificate for Misp Partner 111551 | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_03 | Verify that the system allows successful CA certificate upload for partner ID 111555 when all mandatory and valid inputs are provided. | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_05 | Upload valid CA certificate for Misp Partner 111557 | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_07 | Upload valid CA certificate for Misp Partner 111558 | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_09 | Upload valid CA certificate for Misp Partner 111559 | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_15 | Upload valid CA certificate for Misp Partner 112211 | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_01 | Validate that a CA certificate is uploaded successfully with all required valid inputs, as part of a smoke test | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_12 | Upload valid SUBCA certificate for Misp Partner 111550 | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_14 | Upload valid SUBCA certificate for Misp Partner 111551 | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_04 | Verify that the system allows successful Sub-CA certificate upload for partner ID 111555 when all mandatory and valid inputs are provided | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_06 | Upload valid SUBCA certificate for Misp Partner 111557 | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_08 | Upload valid SUBCA certificate for Misp Partner 111558 | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_10 | Upload valid SUBCA certificate for Misp Partner 111559 | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_16 | Upload valid SUBCA certificate for Misp Partner 112211 | 00:00:01 |
| TC_PMS_UploadCertificateMISPCASUBCA_02 | Validate that a Sub-CA certificate is uploaded successfully with all required valid inputs as part of a smoke test | 00:00:01 |
| UploadMISPPartnerCertificate — Passed | ||
| TC_PMS_UploadMISPPartnerCertificate_01 | Verify that the system allows successful upload of a MISP partner certificate when all mandatory and valid inputs are provided | 00:00:02 |
| TC_PMS_UploadMISPPartnerCertificate_08 | Validate MISP partner certificate upload without providing a policy ID | 00:00:01 |
| TC_PMS_UploadMISPPartnerCertificate_04 | Validate MISP partner certificate upload with the maximum allowed address field length | 00:00:01 |
| TC_PMS_UploadMISPPartnerCertificate_05 | Validate MISP partner certificate upload with the maximum allowed contact number length | 00:00:01 |
| TC_PMS_UploadMISPPartnerCertificate_06 | Validate MISP partner certificate upload with the maximum allowed email ID length | 00:00:02 |
| TC_PMS_UploadMISPPartnerCertificate_07 | Validate MISP partner certificate upload with the language code set to Arabic | 00:00:02 |
| TC_PMS_UploadMISPPartnerCertificate_02 | Validate that the API returns an error or handles appropriately when attempting to upload a MISP partner certificate with an empty policy group | 00:00:02 |
| TC_PMS_UploadMISPPartnerCertificate_03 | Validate MISP partner certificate upload without a policy group | 00:00:01 |
| LinkPolicyGroupToMISPPartner — Passed | ||
| TC_PMS_LinkPolicyGroupToMISPPartner_01 | Validate that the API successfully links a policy group to a MISP partner with valid inputs | 00:00:01 |
| LinkPolicyGroupToMISPPartnerNegTC — Passed | ||
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_10 | Validate that the API returns an error when attempting to link a policy group to a MISP partner that is already linked | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_03 | Validate that the API returns an error when attempting to link a policy group to a MISP partner with an invalid request but a valid partner ID | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_04 | Validate that the API returns an error when attempting to link a policy group to a MISP partner using an invalid policy group ID | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_01 | Validate that the API returns an error when attempting to link a policy group to a MISP partner with invalid inputs | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_05 | Validate that the API returns an error when attempting to link a policy group to a MISP partner using an auth token belonging to a partner instead of an admin | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_06 | Validate that the API returns an error when attempting to link a policy group to a MISP partner using a device token belonging to a partner instead of an admin | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_07 | Validate that the API returns an error when attempting to link a policy group to a MISP partner using an FTM token belonging to a partner instead of an admin | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_09 | Validate that the API returns an error when attempting to link a policy group to a MISP partner using an invalid reques | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_08 | Validate that the API returns an error when attempting to link a policy group to a MISP partner using an invalid API version | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_02 | Validate that the API returns an error when attempting to link a policy group to a MISP partner with a valid request but an invalid partner ID | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_12 | Validate that the API returns an error when attempting to link a policy group to a MISP partner with an empty request ID | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_18 | Validate that the API returns an error when attempting to link a policy group to a MISP partner with an empty request time | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_13 | Validate that the API returns an error when attempting to link a policy group to a MISP partner with a null request ID | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_15 | Validate that the API returns an error when attempting to link a policy group to a MISP partner with a null version parameter | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_17 | Validate that the API returns an error when attempting to link a policy group to a MISP partner using version value 0 | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_16 | Validate that the API returns an error when attempting to link a policy group to a MISP partner using version value 1 | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_21 | Validate that the API returns an error when attempting to link a policy group to a MISP partner without providing the request body | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_20 | Validate that the API returns an error when attempting to link a policy group to a MISP partner without a partner admin role | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_19 | Validate that the API returns an error when attempting to link a policy group to a MISP partner without providing request time | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_14 | Validate that the API returns an error when attempting to link a policy group to a MISP partner without providing the version field | 00:00:01 |
| TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_11 | Validate that the API returns an error when attempting to link a policy group to a MISP partner without providing a request ID | 00:00:01 |
| MISPPartnerExists — Passed | ||
| TC_PMS_MISPPartnerExists_01 | Validate that the API successfully confirms the existence of a MISP partner when all required valid parameters are provided as part of a smoke test | 00:00:01 |
| MISPPartnerExistsNegTC — Passed | ||
| TC_PMS_MISPPartnerExistsNegTC_06 | Validate that the API returns an error when checking MISP partner existence using an email value provided as an invalid string format | 00:00:01 |
| TC_PMS_MISPPartnerExistsNegTC_04 | Validate that the API returns an error when checking MISP partner existence with an empty partner type | 00:00:01 |
| TC_PMS_MISPPartnerExistsNegTC_01 | Validate that the API returns an error when checking MISP partner existence using an invalid access token | 00:00:01 |
| TC_PMS_MISPPartnerExistsNegTC_02 | Validate that the API returns an error when checking MISP partner existence using an invalid partner ID | 00:00:01 |
| TC_PMS_MISPPartnerExistsNegTC_05 | Validate that the API returns an error when checking MISP partner existence using an invalid partner type | 00:00:01 |
| TC_PMS_MISPPartnerExistsNegTC_03 | Validate that the API returns an error when checking MISP partner existence using an invalid version value | 00:00:01 |
| TC_PMS_MISPPartnerExistsNegTC_07 | Validate that the API returns an error when checking MISP partner existence using a partner ID provided as an invalid string format | 00:00:01 |
| TC_PMS_MISPPartnerExistsNegTC_08 | Validate that the API returns an error when checking MISP partner existence using a partner type provided as an invalid string format | 00:00:01 |
| GetListofPartnersAssociatedwithLoggedinUser — Passed | ||
| TC_GetListofPartnersAssociatedwithLoggedinUser_01 | Validate that the API successfully retrieves the list of partners associated with the logged in user | 00:00:05 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_08 | Validate that the API retrieves the list of partners associated with the loggedin user when a valid auth token is provided | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_09 | Validate that the API retrieves the list of partners associated with the logged in user when a valid device token is provided | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_10 | Validate that the API retrieves the list of partners associated with the logged in user when a valid FTM token is provided | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_07 | Validate that the API retrieves the list of partners associated with the logged in user when only the status filter is applied | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_06 | Validate that the API retrieves the list of partners associated with the logged in user when the partner type field is empty | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_05 | Validate that the API retrieves the list of partners associated with the logged in user when the policy group field is empty | 00:00:05 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_03 | Validate that the API retrieves the list of partners associated with the logged in user when no policy group is available | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_04 | Validate that the API retrieves the list of partners associated with the logged in user when a policy group is available | 00:00:05 |
| TC_GetListofPartnersAssociatedwithLoggedinUser_02 | Validate that the API retrieves the list of partners associated with the logged in user when the status filter is set to InProgress | 00:00:01 |
| GetListofPartnersAssociatedwithLoggedinUserNegSce — Passed | ||
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_08 | Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using an invalid status with a valid partner type | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_01 | Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using an invalid token | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_03 | Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using an invalid partner type | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_06 | Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using an invalid query parameter | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_07 | Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user if MISP partner fetching fails | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_02 | Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using special characters in the status filter | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_04 | Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using special characters in the partner type filter | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_10 | Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using both invalid status and invalid partner type | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_05 | Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using a lowercase partner type value | 00:00:01 |
| TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_09 | Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using a valid status with an invalid partner type | 00:00:01 |
| CreatePartner_Online_Verification_Partner — Passed | ||
| TC_PMS_createCredentialPartnerSelfRegistration_01 | Validate that a credential partner successfully completes self-registration when all inputs are valid | 00:00:01 |
| TC_PMS_createCredentialPartnerSelfRegistration_03 | Validate that credential partner self-registration fails when the email address is already in use | 00:00:01 |
| TC_PMS_createCredentialPartnerSelfRegistration_02 | Validate that credential partner self-registration fails when mandatory input parameters are missing | 00:00:01 |
| GetAllApiKeyForAuthPartnerWithoutPartnerCertifcates — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerWithoutcertupload_01 | Validate that retrieving API keys fails when the partner has not uploaded the required certificate | 00:00:01 |
| VerifyPartnersEmail — Passed | ||
| TC_PMS_VerifyPartnersEmail_01 | Validate that verifying a partner’s email with all valid inputs is successful | 00:00:01 |
| TC_PMS_VerifyPartnersEmail_03 | Validate that verifying a Device Provider partners email with all valid inputs is successful | 00:00:01 |
| TC_PMS_VerifyPartnersEmail_07 | Validate that verifying an FTM Provider partners email with all valid inputs is successful | 00:00:01 |
| TC_PMS_VerifyPartnersEmail_06 | Validate that verifying a partners email fails when an invalid email is provided | 00:00:01 |
| TC_PMS_VerifyPartnersEmail_05 | Validate that verifying a partner’s email fails when the email parameter is missing | 00:00:01 |
| TC_PMS_VerifyPartnersEmail_04 | Validate that verifying a partners email fails when authentication is not provided | 00:00:01 |
| GetPartnerExpiringCertificateBeforeCertificateUpload — Passed | ||
| TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_03 | Validate that no expiring partner certificates are returned if certificates have not been uploaded yet | 00:00:01 |
| UploadCACertificate — Passed | ||
| TC_PMS_UploadCACertificate_01 | Validate that uploading a CA Certificate with all valid inputs is successful and reflected correctly | 00:00:01 |
| TC_PMS_UploadCACertificate_05 | Validate that re-uploading an already uploaded CA Certificate fails | 00:00:01 |
| TC_PMS_UploadCACertificate_07 | Validate that uploading a CA Certificate fails when the input data is blank | 00:00:01 |
| TC_PMS_UploadCACertificate_06 | Validate that uploading a CA Certificate fails when invalid data is provided | 00:00:01 |
| TC_PMS_UploadCACertificate_03 | Validate that uploading a Device Provider Certificate with all valid inputs is successful and reflected correctly | 00:00:01 |
| TC_PMS_UploadCACertificate_08 | Validate that uploading a Certificate for an FTM Provider with all valid inputs is successful | 00:00:01 |
| TC_PMS_UploadCACertificate_04 | Validate that uploading a Sub CA Certificate for a Device Provider with all valid inputs is successful | 00:00:01 |
| TC_PMS_UploadCACertificate_09 | Validate that uploading a Sub CA Certificate for an FTM Provider with all valid inputs is successful | 00:00:01 |
| TC_PMS_UploadCACertificate_02 | Validate that uploading a Sub CA Certificate with all valid inputs is successful and reflected correctly | 00:00:01 |
| GetAllCertificateBeforeCACertificateUpload — Passed | ||
| TC_PMS_GetAllCertificateBeforeCACertificateUpload_01 | Validate that retrieving certificates fails when the CA certificates have not been uploaded | 00:00:01 |
| GetOriginalPartnerCertificatesBeforeCertificateUpload — Passed | ||
| TC_PMS_getPartner_certificate_08 | Validate that no partner certificates are returned if the certificates have not been uploaded yet | 00:00:01 |
| UploadPartnerCertificate — Passed | ||
| TC_PMS_uploadPartnerCert_01 | Validate that uploading a Partner Certificate with all valid inputs including sid is successful | 00:00:02 |
| TC_PMS_uploadPartnerCert_07 | Validate that uploading a Partner Certificate again fails when the certificate already exists | 00:00:02 |
| TC_PMS_uploadPartnerCert_06 | Validate that uploading a Partner Certificate fails when an invalid domain is provided | 00:00:01 |
| TC_PMS_uploadPartnerCert_05 | Validate that uploading a Partner Certificate fails when an invalid certificate is provided | 00:00:01 |
| TC_PMS_uploadPartnerCert_04 | Validate that uploading a Partner Certificate fails when the Partner Domain is missing | 00:00:01 |
| TC_PMS_uploadPartnerCert_03 | Validate that uploading a Partner Certificate and Device Provider Certificate with all valid inputs is successful | 00:00:01 |
| TC_PMS_uploadPartnerCert_08 | Validate that uploading a Partner Certificate and FTM Provider Certificate with all valid inputs is successful | 00:00:01 |
| GetPartnerCertificate — Passed | ||
| TC_PMS_GetPartnerCert_01 | Validate that all partner certificates are successfully retrieved for an authenticated partner with valid inputs | 00:00:01 |
| TC_PMS_GetPartnerCert_04 | Validate that all partner certificates are successfully retrieved for a device provider with valid inputs | 00:00:01 |
| TC_PMS_GetPartnerCert_02 | Get partner certificate succeeds for FTM providerValidate that all partner certificates are successfully retrieved for an FTM provider with valid inputs | 00:00:01 |
| TC_PMS_GetPartnerCert_03 | Validate that partner certificate retrieval fails when requested for an unregistered partner | 00:00:01 |
| GetAllCertificate — Passed | ||
| TC_PMS_GetAllCertificate_02 | Validate that all device certificates are successfully retrieved with valid inputs | 00:00:01 |
| TC_PMS_GetAllCertificate_01 | Validate that all certificates are successfully retrieved with valid inputs | 00:00:01 |
| TC_PMS_GetAllCertificate_04 | Validate that retrieving certificates fails when an invalid authentication is provided | 00:00:01 |
| TC_PMS_GetAllCertificate_03 | Validate that retrieving certificates fails when authentication is not provided | 00:00:01 |
| UpdatePartner — Passed | ||
| TC_PMS_updatePartnerDetails_01 | Validate that updating Partner details with all valid inputs is successful and the changes are reflected correctly | 00:00:01 |
| TC_PMS_updatePartnerDetails_03 | Validate that updating Partner details fails when the address parameter is missing | 00:00:01 |
| TC_PMS_updatePartnerDetails_04 | Validate that updating Partner details fails when the contactNumber parameter is missing | 00:00:01 |
| TC_PMS_updatePartnerDetails_02 | Validate that updating Partner details fails when an invalid partnerId is provided | 00:00:01 |
| UploadCACertificate_Online_Verification_Partner — Passed | ||
| TC_PMS_uploadCredentialPartnerCACert_01 | Validate that CA certificates are successfully uploaded when all inputs are valid | 00:00:01 |
| TC_PMS_uploadCredentialPartnerCACert_02 | Validate that CA certificate upload fails when invalid certificate data is provided | 00:00:01 |
| TC_PMS_uploadCredentialPartnerSubcaCert_03 | Validate that Sub CA certificates are successfully uploaded when all inputs are valid | 00:00:02 |
| UploadPartnerCertificate_Online_Verification_Partner — Passed | ||
| TC_PMS_uploadCredentialPartnerCert_01 | Validate that certificates are successfully uploaded when all inputs are valid | 00:00:02 |
| GetPartnerDetails_Online_Verification_Partner — Passed | ||
| TC_PMS_getOnlineVerificationPartner_01 | Validate that all partner details are successfully retrieved when valid inputs are provided | 00:00:01 |
| TC_PMS_getOnlineVerificationPartner_02 | Validate that retrieving partner details fails when an invalid partner ID is provided | 00:00:01 |
| GetPartnerCertificate_Online_Verification_Partner — Passed | ||
| TC_PMS_getOnlineVerificationPartnerCert_01 | Validate that partner certificates are retrieved successfully when all inputs are valid | 00:00:01 |
| GetAllApprovedPartnerId — Passed | ||
| TC_PMS_GetAllApprovedAuthPartnerId_01 | Validate that all approved authenticated partner IDs are successfully retrieved with valid inputs | 00:00:01 |
| GetAllApprovedPartnerIdWithoutAuthentication — Passed | ||
| TC_PMS_GetAllApprovedAuthPartnerId_02_neg | Validate that retrieving approved authenticated partner IDs fails when an invalid authentication is provided | 00:00:01 |
| TC_PMS_GetAllApprovedAuthPartnerId_01_neg | Validate that retrieving approved authenticated partner IDs fails when authentication is not provided | 00:00:01 |
| GetAllApiKeyForAuthPartnerBeforePolicyMapping — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerBeforePolicyMapping_01 | Validate that retrieving API keys for a partner fails when no policy has been mapped yet | 00:00:01 |
| GetAllRequestedPolicyBeforeMapping — Passed | ||
| TC_PMS_GetAllRequestedPolicies_03 | Validate that all requested policies are successfully retrieved with valid inputs | 00:00:01 |
| AddAdditionalContact — Passed | ||
| TC_PMS_AddContact_01 | Validate that a new contact can be added successfully when all required inputs are provided and valid | 00:00:01 |
| TC_PMS_AddContact_02 | Validate that adding a contact fails when the address input parameter is missing | 00:00:01 |
| TC_PMS_AddContact_03 | Validate that adding a contact fails when the contact number input parameter is missing | 00:00:01 |
| TC_PMS_AddContact_04 | Validate that adding a contact fails when the email ID input parameter is missing | 00:00:01 |
| partnerPolicyMapping — Passed | ||
| TC_PMS_RequestAPIKeyCredentialPartner_06 | Validate that creating a partner API key request fails when both the policy name and use case description are invalid | 00:00:01 |
| TC_PMS_RequestAPIKeyCredentialPartner_05 | Validate that creating a partner API key request fails when an invalid use case description is provided | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_03 | Validate that partner API key request approval fails when the associated policy is deactivated | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_04 | Validate that submitting a partner API key request fails when the partner mapping is in an in progress state | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_01 | Validate that partner API key requests can be submitted and rejected successfully for all valid entries | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_05 | Validate that partner policy mappings are retrieved successfully for all valid entries | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_02 | Validate that partner-policy mappings are retrieved successfully for all valid entries in scenarios related to OIDC client deactivation | 00:00:01 |
| TC_PMS_RequestAPIKeyauthPartner_12 | Validate that partner policy mappings in a pending state are listed correctly for all valid entries | 00:00:01 |
| TC_PMS_RequestAPIKeyauthPartner_11 | Validate that all valid partner-policy mappings are accessible and correctly listed during API key rejection processes | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_06 | Validate that partner-policy mappings are retrieved successfully for all valid MISPs | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_08 | Validate that retrieving partner-policy mappings fails when an invalid partner ID is provided | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_07 | Validate that retrieving partner-policy mappings fails when an invalid policy name is provided | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_09 | Validate that retrieving partner-policy mappings fails when the policy name is missing | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_10 | Validate that retrieving partner-policy mappings fails when the use case description is missing | 00:00:01 |
| AddBioExtractors — Passed | ||
| TC_PMS_addBioExtractors_01 | Validate that bio extractors can be successfully added under the Mosip Data Share policy when all inputs are valid | 00:00:01 |
| TC_PMS_addBioExtractors_02 | Validate that bio extractors can be successfully added under the Mosip policy when all inputs are valid | 00:00:01 |
| TC_PMS_addBioExtractors_04 | Validate that adding bio extractors fails when an invalid partner ID is provided | 00:00:01 |
| TC_PMS_addBioExtractors_03 | Validate that adding bio extractors fails when an invalid policy ID is provided | 00:00:01 |
| RejectMappingKey — Passed | ||
| TC_PMS_RejectAPIKey_02 | Validate that mapping key rejection fails when the status input parameter is missing | 00:00:01 |
| ApproveMappingKey — Passed | ||
| TC_PMS_ApproveAPIKey_02 | Validate that a mapping key is successfully approved when all input parameters are valid | 00:00:01 |
| TC_PMS_ApproveAPIKey_01 | Validate that a mapping key can be approved successfully even when the associated OIDC client is deactivated, using valid inputs | 00:00:01 |
| TC_PMS_ApproveAPIKey_03 | Validate that a mapping key is successfully approved for a MISP policy when all inputs are valid | 00:00:01 |
| TC_PMS_ApproveAPIKey_09 | Validate that mapping key approval fails when attempting to map a partner to a policy that is already mapped | 00:00:01 |
| TC_PMS_ApproveAPIKey_05 | Validate that mapping key approval fails when the request time is missing | 00:00:01 |
| TC_PMS_ApproveAPIKey_07 | Validate that mapping key approval fails when the status field is missing | 00:00:01 |
| TC_PMS_ApproveAPIKey_04 | Validate that mapping key approval fails when the request time is set to a past date | 00:00:01 |
| TC_PMS_ApproveAPIKey_10 | Validate that a mapping key is successfully rejected when all input parameters are valid | 00:00:01 |
| TC_PMS_ApproveAPIKey_08 | Validate that a mapping key with rejected status is successfully approved when all inputs are valid | 00:00:01 |
| TC_PMS_ApproveAPIKey_06 | Validate that mapping key approval fails when the mapping key contains spaces | 00:00:01 |
| GetAllRequestedPolicy — Passed | ||
| TC_PMS_GetAllRequestedPolicies_03 | Validate that all requested policies are successfully retrieved with valid inputs | 00:00:01 |
| GetAllRequestedPolicyAuthvalidations — Passed | ||
| TC_PMS_GetAllRequestedPolicies_02 | Validate that requested policies retrieval fails when an invalid or expired authentication token is used | 00:00:01 |
| TC_PMS_GetAllRequestedPolicies_01 | Validate that requested policies retrieval fails when no authentication is provided | 00:00:01 |
| GetAllApprovedAuthPartnerPolicy — Passed | ||
| TC_PMS_GetAllApprovedAuthPartnerPolicy_03 | Validate that all approved policies for an authenticated partner are successfully retrieved with valid inputs | 00:00:01 |
| GetAllApprovedAuthPartnerPolicyAuthValidations — Passed | ||
| TC_PMS_GetAllApprovedAuthPartnerPolicy_02 | Validate that retrieving all approved policies for a partner fails when an invalid authentication is provided | 00:00:01 |
| TC_PMS_GetAllApprovedAuthPartnerPolicy_01 | Validate that retrieving all approved policies for a partner fails when authentication is not provided | 00:00:01 |
| GetAllApiKeyForAuthPartnerBeforeApikeyGenerated — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerBeforeApiKeyGenerated_01 | Validate that retrieving API keys for a partner fails when no API key has been generated yet | 00:00:01 |
| GenerateApiKey — Passed | ||
| TC_PMS_GenerateApikey_01 | Validate that an API key is successfully generated with all valid inputs | 00:00:01 |
| TC_PMS_GenerateApikey_07 | Validate that API key generation fails when an invalid policy is provided | 00:00:01 |
| TC_PMS_GenerateApikey_03 | Validate that API key generation fails when the requestTime parameter is missing | 00:00:01 |
| TC_PMS_GenerateApikey_05 | Validate that API key generation fails when the label parameter is missing | 00:00:01 |
| TC_PMS_GenerateApikey_06 | Validate that API key generation fails when the policyName parameter is missing | 00:00:01 |
| TC_PMS_GenerateApikey_04 | Validate API key generation fails when requestTime is missing | 00:00:01 |
| TC_PMS_GenerateApikey_02 | Validate that regenerating an API key fails when the same key already exists | 00:00:01 |
| TC_PMS_GenerateApikey_08 | Validate that API keys are successfully generated for all approved policies with valid inputs | 00:00:01 |
| ActivateDeactivatePartnerApiKey — Passed | ||
| TC_PMS_ActivateDeactivatePartnerApiKey_08 | Validate that API key activation or deactivation fails when the label is removed or missing | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_07 | Validate that API key activation fails when attempting to activate using a duplicate label | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_06 | Validate that API key activation or deactivation fails when an invalid label is provided | 00:00:01 |
| Pms_ActivateDeactivatePartnerApiKey_activate_allValid_smoke | Validate that partner activation or deactivation fails when an invalid partner ID is provided | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_02 | Validate that API key deactivation fails when an invalid API key is provided | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_01 | Validate that an active API key is successfully deactivated when a valid deactivate request is submitted | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_04 | Validate that API key activation or deactivation fails when an invalid partner ID is provided | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_05 | Validate that API key activation or deactivation fails when an invalid policy ID is provided | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_03 | Validate that an inactive API key is successfully activated when a valid activate request is submitted | 00:00:01 |
| InsertDBData — Passed | ||
| TC_DBDependent_InsertQuery_03 | Validate that API key data is inserted into the database with an expiry set 10 days from the creation date | 00:00:01 |
| TC_DBDependent_InsertQuery_02 | Validate that API key data is inserted into the database with an expiry set 15 days from the creation date | 00:00:01 |
| TC_DBDependent_InsertQuery_01 | Validate that API key data is inserted successfully into the database when a valid request is submitted | 00:00:01 |
| GetAllApiKeyForAuthPartner — Passed | ||
| TC_PMS_GetAllApikeyForAuthPartner_01 | Validate that all API keys are successfully retrieved for an authenticated partner with valid inputs | 00:00:01 |
| TC_PMS_GetAllApikeyForAuthPartner_03 | Validate that retrieving API keys for a partner fails when an invalid authentication is provided | 00:00:01 |
| TC_PMS_GetAllApikeyForAuthPartner_02 | Validate that retrieving API keys for a partner fails when authentication is not provided | 00:00:01 |
| GetAllApiKeyForAuthPartnerAfterDeactive — Passed | ||
| TC_PMS_GetAllApikeyForAuthPartner_01 | Validate that all API keys are successfully retrieved for an authenticated partner with valid inputs | 00:00:01 |
| TC_PMS_GetAllApikeyForAuthPartner_03 | Validate that retrieving API keys for a partner fails when an invalid authentication is provided | 00:00:01 |
| TC_PMS_GetAllApikeyForAuthPartner_02 | Validate that retrieving API keys for a partner fails when authentication is not provided | 00:00:01 |
| GetAllPartnerPolicyRequest — Passed | ||
| TC_PMS_partner-policy-requests_01 | Validate that all partner policy requests are successfully retrieved when a valid request is made | 00:00:01 |
| TC_PMS_partner-policy-requests_07 | Validate that partner policy requests are successfully retrieved when filtered by a valid policyId | 00:00:01 |
| TC_PMS_partner-policy-requests_22 | Validate that partner policy requests are successfully retrieved when filtered using a combination | 00:00:01 |
| TC_PMS_partner-policy-requests_05 | Validate that partner policy requests are successfully retrieved when filtered by a valid orgName | 00:00:01 |
| TC_PMS_partner-policy-requests_19 | Validate that partner policy requests are successfully retrieved when a specific page number is provided | 00:00:01 |
| TC_PMS_partner-policy-requests_04 | Validate that partner policy requests are successfully retrieved when filtered by a valid partnerId | 00:00:01 |
| TC_PMS_partner-policy-requests_10 | Validate that partner policy requests are successfully retrieved when filtered by a valid partnerType | 00:00:01 |
| TC_PMS_partner-policy-requests_09 | Validate that partner policy requests are successfully retrieved when filtered by a valid policyGroupName | 00:00:01 |
| TC_PMS_partner-policy-requests_08 | Validate that partner policy requests are successfully retrieved when filtered by a valid policyName | 00:00:01 |
| TC_PMS_partner-policy-requests_21 | Validate that partner policy requests retrieval fails or returns no data when filtered with an random value | 00:00:01 |
| TC_PMS_partner-policy-requests_06 | Validate that partner policy requests are successfully retrieved when filtered by requestDetails | 00:00:01 |
| TC_PMS_partner-policy-requests_12 | Validate that partner policy requests are successfully retrieved in ascending order when sorted by a valid sortType | 00:00:01 |
| TC_PMS_partner-policy-requests_11 | Validate that partner policy requests are successfully retrieved in descending order when sorted by a valid sortType | 00:00:01 |
| TC_PMS_partner-policy-requests_14 | Validate that partner policy requests with status Inprogress are successfully retrieved | 00:00:01 |
| TC_PMS_partner-policy-requests_15 | Validate that partner policy requests with status Approved are successfully retrieved | 00:00:01 |
| TC_PMS_partner-policy-requests_16 | Validate that partner policy requests with status Rejected are successfully retrieved | 00:00:01 |
| GetAllPartnerPolicyRequestNegativeScenarios — Passed | ||
| TC_PMS_partner-policy-requests_03 | Validate that partner policy requests retrieval fails when an invalid or expired token is used | 00:00:01 |
| TC_PMS_partner-policy-requests_18 | Validate that partner policy requests retrieval fails an error when an invalid pageNo is provided | 00:00:01 |
| TC_PMS_partner-policy-requests_17 | Validate that partner policy requests retrieval fails an error when an invalid pageSize is provided | 00:00:01 |
| TC_PMS_partner-policy-requests_20 | Validate that partner policy requests retrieval fails an error when an invalid sortFieldName is provided | 00:00:01 |
| TC_PMS_partner-policy-requests_13 | Validate that partner policy requests retrieval fails an error when an invalid sortType is provided | 00:00:01 |
| TC_PMS_partner-policy-requests_02 | Validate that partner policy requests retrieval fails when no authentication is provided | 00:00:01 |
| GetListOfPartners — Passed | ||
| TC_PMS_GetListOfPartners_01 | Validate that all partners are successfully retrieved with valid inputs | 00:00:01 |
| TC_PMS_GetListOfPartners_02 | Validate that all partners are successfully retrieved for the admin dashboard with valid inputs | 00:00:01 |
| TC_PMS_GetListOfPartners_24 | Validate that partners are successfully retrieved and sorted in ascending order when filtered by a valid organization name | 00:00:01 |
| TC_PMS_GetListOfPartners_23 | Validate that only active partners are successfully retrieved when filtered by isActive=true | 00:00:01 |
| TC_PMS_GetListOfPartners_05 | Validate that partner list retrieval fails when an invalid token is used | 00:00:01 |
| TC_PMS_GetListOfPartners_41 | Validate that active partners without uploaded certificates are successfully retrieved | 00:00:01 |
| TC_PMS_GetListOfPartners_40 | Validate that active partners with uploaded certificates are successfully retrieved | 00:00:01 |
| TC_PMS_GetListOfPartners_44 | Validate that active partners are successfully retrieved when filtered by a valid partnerId | 00:00:01 |
| TC_PMS_GetListOfPartners_43 | Validate that active partners are successfully retrieved when filtered by a valid partner type | 00:00:01 |
| TC_PMS_GetListOfPartners_42 | Validate that active partners are successfully retrieved when filtered by a valid policy group name | 00:00:01 |
| TC_PMS_GetListOfPartners_39 | Validate that active partners are successfully retrieved and sorted in ascending order | 00:00:01 |
| TC_PMS_GetListOfPartners_46 | Validate that deactivated partners are successfully retrieved when filtered by a valid partnerId | 00:00:01 |
| TC_PMS_GetListOfPartners_45 | Validate that inactive partners are successfully retrieved when filtered by a valid partnerId | 00:00:01 |
| TC_PMS_GetListOfPartners_48 | Validate that partner list retrieval fails when the status parameter is empty | 00:00:01 |
| TC_PMS_GetListOfPartners_49 | Validate that partner list retrieval fails when a numeric value is provided for the status parameter instead of a valid status string | 00:00:01 |
| TC_PMS_GetListOfPartners_35 | Validate that only partners with status Active are successfully retrieved | 00:00:01 |
| TC_PMS_GetListOfPartners_38 | Validate that active partners are successfully retrieved with pagination applied | 00:00:01 |
| TC_PMS_GetListOfPartners_37 | Validate that only partners with status Deactivated are successfully retrieved | 00:00:01 |
| TC_PMS_GetListOfPartners_36 | Validate that only partners with status Inactive are successfully retrieved | 00:00:01 |
| TC_PMS_GetListOfPartners_50 | Validate that partner list retrieval fails when the status parameter contains special characters instead of a valid status value | 00:00:01 |
| TC_PMS_GetListOfPartners_30 | Validate that partners are successfully retrieved when filtered by certificate upload status | 00:00:01 |
| TC_PMS_GetListOfPartners_31 | Validate that partners are successfully retrieved and sorted in ascending order by certificate upload status | 00:00:01 |
| TC_PMS_GetListOfPartners_33 | Validate that partner list retrieval fails when sort type is provided without a sort field name for certificate upload status | 00:00:01 |
| TC_PMS_GetListOfPartners_32 | Validate that partners are successfully retrieved and sorted in descending order by certificate upload status | 00:00:01 |
| TC_PMS_GetListOfPartners_28 | Validate that partners are successfully retrieved and sorted in ascending order when filtered by a valid email address | 00:00:01 |
| TC_PMS_GetListOfPartners_09 | Validate that partner list retrieval fails when the page number is empty | 00:00:01 |
| TC_PMS_GetListOfPartners_12 | Validate that partner list retrieval fails when the partnerId is empty | 00:00:01 |
| TC_PMS_GetListOfPartners_14 | Validate that partner list retrieval fails when the partnerType is empty | 00:00:01 |
| TC_PMS_GetListOfPartners_08 | Validate that partner list retrieval fails when an invalid page number is provided | 00:00:01 |
| TC_PMS_GetListOfPartners_10 | Validate that partner list retrieval fails when an invalid page size is provided | 00:00:01 |
| TC_PMS_GetListOfPartners_11 | Validate that partner list retrieval fails when an invalid partnerId is provided | 00:00:01 |
| TC_PMS_GetListOfPartners_13 | Validate that partner list retrieval fails when an invalid partnerType is provided | 00:00:01 |
| TC_PMS_GetListOfPartners_29 | Validate that partner list retrieval fails when an invalid sort field name is provided | 00:00:01 |
| TC_PMS_GetListOfPartners_34 | Validate that partner list retrieval fails when an invalid sort type is provided | 00:00:01 |
| TC_PMS_GetListOfPartners_06 | Validate that partner list retrieval fails when an invalid sort field is provided | 00:00:01 |
| TC_PMS_GetListOfPartners_07 | Validate that partner list retrieval fails when an invalid sort type is provided | 00:00:01 |
| TC_PMS_GetListOfPartners_25 | Validate that partners are successfully retrieved and sorted in ascending order when filtered by a valid partner type | 00:00:01 |
| TC_PMS_GetListOfPartners_26 | Validate that partners are successfully retrieved and sorted in descending order when filtered by a valid partner type | 00:00:01 |
| TC_PMS_GetListOfPartners_28 | Validate that partners are successfully retrieved and sorted in ascending order when filtered by a valid partnerId | 00:00:01 |
| TC_PMS_GetListOfPartners_27 | Validate that partners are successfully retrieved and sorted in descending order when filtered by a valid partnerId | 00:00:01 |
| TC_PMS_GetListOfPartners_47 | Validate that partner list retrieval fails when an invalid status value is provided | 00:00:01 |
| TC_PMS_GetListOfPartners_15 | Validate that deactivated partners are not retrieved in the partner list | 00:00:01 |
| TC_PMS_GetListOfPartners_18 | Validate that partner list retrieval fails when the email address is empty | 00:00:01 |
| TC_PMS_GetListOfPartners_17 | Validate that partner list retrieval fails when the organization name is empty | 00:00:01 |
| TC_PMS_GetListOfPartners_22 | Validate that partner list retrieval fails when the policy group name is empty | 00:00:01 |
| TC_PMS_GetListOfPartners_04 | Validate that partner list retrieval fails when the sort parameter is empty | 00:00:01 |
| TC_PMS_GetListOfPartners_19 | Validate that partner list retrieval fails when an invalid email address is provided | 00:00:01 |
| TC_PMS_GetListOfPartners_16 | Validate that partner list retrieval fails when an invalid organization name is provided | 00:00:01 |
| TC_PMS_GetListOfPartners_21 | Validate that partner list retrieval fails when an invalid policy group name is provided | 00:00:01 |
| TC_PMS_GetListOfPartners_03 | Validate that partner list retrieval fails when an invalid sort parameter is provided | 00:00:01 |
| TC_PMS_GetListOfPartners_20 | Validate that partner list retrieval fails when the email address is not uploaded | 00:00:01 |
| GetDetailsOfPartner — Passed | ||
| TC_PMS_GetPartnerDetails_02 | Validate that all details of a partner are successfully retrieved with valid inputs | 00:00:01 |
| TC_PMS_GetPartnerDetails_01 | Validate that all details of a device partner are successfully retrieved with valid inputs | 00:00:01 |
| TC_PMS_GetPartnerDetails_04 | Validate that partner details retrieval fails when an invalid token is used | 00:00:01 |
| TC_PMS_GetPartnerDetails_03 | Validate that partner details retrieval fails when attempted with an admin role that is not authorized | 00:00:01 |
| TC_PMS_GetPartnerDetails_05 | Validate that partner details retrieval fails when requested for an invalid partner | 00:00:01 |
| TC_PMS_GetPartnerDetails_07 | Validate that partner details retrieval fails when an unauthorized privileged token is used | 00:00:01 |
| TC_PMS_GetPartnerDetails_06 | Validate that partner details retrieval fails when an unauthorized token is used | 00:00:01 |
| TC_PMS_GetPartnerDetails_08 | Validate that partner details retrieval fails when attempted without an admin role | 00:00:01 |
| GetListOfPolicies — Passed | ||
| TC_PMS_listofPolicies_01 | Validate that the system successfully retrieves the list of policies when all required inputs and query parameters are valid | 00:00:01 |
| TC_PMS_listofPolicies_02 | Validate that fetching the list of policies fails when an invalid access token is used and the system returns the appropriate authorization error response | 00:00:01 |
| TC_PMS_listofPolicies_21 | Validate that the API successfully retrieves policies when filtered using a combination of two valid attributes | 00:00:01 |
| TC_PMS_listofPolicies_08 | Validate that the API fails when a negative page number is provided | 00:00:01 |
| TC_PMS_listofPolicies_09 | Validate that the API fails when a negative page size is provided | 00:00:01 |
| TC_PMS_listofPolicies_10 | Verify that the API returns policies for the specified valid page number | 00:00:01 |
| TC_PMS_listofPolicies_07 | Verify that the API returns policies limited to the specified valid pageSize | 00:00:01 |
| TC_PMS_listofPolicies_20 | Validate that the API fails or returns no results when filtered with a random or invalid policy description | 00:00:01 |
| TC_PMS_listofPolicies_17 | Validate that the API successfully retrieves policies when filtered by a valid policy description | 00:00:01 |
| TC_PMS_listofPolicies_16 | Validate that the API successfully retrieves policies when filtered by a valid policy group name | 00:00:01 |
| TC_PMS_listofPolicies_14 | Validate that the API successfully retrieves the policy details when a valid policy ID is provided | 00:00:01 |
| TC_PMS_listofPolicies_15 | Validate that the API successfully retrieves policies when filtered by a valid policy name | 00:00:01 |
| TC_PMS_listofPolicies_19 | Validate that the API fails when an invalid sort field name is provided | 00:00:01 |
| TC_PMS_listofPolicies_18 | Validate that the API successfully retrieves policies when a valid sort field name is provided | 00:00:01 |
| TC_PMS_listofPolicies_11 | Verify that policies are successfully retrieved in ascending order when a valid sort type is specified | 00:00:01 |
| TC_PMS_listofPolicies_12 | Verify that policies are successfully retrieved in descending order when a valid sort type is specified | 00:00:01 |
| TC_PMS_listofPolicies_13 | Validate that the API fails when an invalid sort type is provided | 00:00:01 |
| TC_PMS_listofPolicies_04 | Validate that the API returns only policies with Activated status when the status filter is set to activated | 00:00:01 |
| TC_PMS_listofPolicies_05 | Validate that the API returns only policies with Deactivated status when the status filter is set to deactivated | 00:00:01 |
| TC_PMS_listofPolicies_06 | Validate that the API returns only policies with Draft status when the status filter is set to draft | 00:00:01 |
| TC_PMS_listofPolicies_03 | Validate that fetching the list of policies fails when no authentication token is provided and the system returns the appropriate unauthorized error response | 00:00:01 |
| GetListOfPoliciesRequest — Passed | ||
| TC_PMS_GetListOfPolicyrequests_01 | Validate that the API successfully retrieves all policies when all inputs and filters are valid | 00:00:01 |
| GetAllOidcClientBeforeOIDCCreation — Passed | ||
| TC_PMS_GetAllOidcClient_01 | Validate that all OIDC clients are successfully retrieved when a valid request with proper authorization is made | 00:00:01 |
| OAuthClient — Passed | ||
| TC_PMS_CreateOIDCClient_02 | Validate OIDC client creation fails with invalid inputs | 00:00:01 |
| TC_PMS_CreateOIDCClient_01 | Validate that an OIDC client is created successfully with all required valid inputs as part of a smoke test | 00:00:01 |
| TC_PMS_CreateOIDCClient_05 | Validate that OIDC client creation fails with an invalid redirect URI | 00:00:01 |
| TC_PMS_CreateOIDCClient_06 | Validate that OIDC client creation fails with invalid authentication details | 00:00:01 |
| TC_PMS_CreateOIDCClient_08 | Validate that OIDC client creation fails when invalid grant types are provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_04 | Validate that OIDC client creation fails with an invalid logo URI | 00:00:01 |
| TC_PMS_CreateOIDCClient_03 | Validate that OIDC client creation fails with an invalid policy ID | 00:00:01 |
| TC_PMS_CreateOIDCClient_11 | Validate that OIDC client creation fails when an invalid public key is provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_09 | Validate that OIDC client creation fails when grant types are not provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_10 | Validate that OIDC client creation fails when the client name is not provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_07 | Validate that OIDC client creation fails when the public key is not provided | 00:00:01 |
| GetAllOauthClient — Passed | ||
| TC_PMS_GetAllOauthClient_01 | Validate that all OAuth clients are successfully retrieved when a valid request is made | 00:00:01 |
| CreateOIDCClient — Passed | ||
| TC_PMS_CreateOIDCClient_33 | Validate that OIDC client creation fails when client authentication methods are provided but empty | 00:00:01 |
| TC_PMS_CreateOIDCClient_35 | Validate that OIDC client creation fails when the client name language map is empty | 00:00:01 |
| TC_PMS_CreateOIDCClient_28 | Validate that OIDC client creation fails when grant types are empty | 00:00:01 |
| TC_PMS_CreateOIDCClient_05 | Validate OIDC client creation fails with an empty name | 00:00:01 |
| TC_PMS_CreateOIDCClient_11 | Validate that OIDC client creation fails when the policy ID is empty | 00:00:01 |
| TC_PMS_CreateOIDCClient_15 | Validate that OIDC client creation fails when the public key is empty | 00:00:01 |
| TC_PMS_CreateOIDCClient_24 | Validate that OIDC client creation fails when redirect URLs are empty | 00:00:01 |
| TC_PMS_CreateOIDCClient_37 | Validate that OIDC client creation fails when the user response type is empty | 00:00:01 |
| TC_PMS_CreateOIDCClient_25 | Validate that OIDC client creation handles correctly when grant types contain extra spaces | 00:00:01 |
| TC_PMS_CreateOIDCClient_30 | Validate that OIDC client creation fails when grant types contain special characters | 00:00:01 |
| TC_PMS_CreateOIDCClient_34 | Validate that OIDC client creation fails when invalid client authentication methods are provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_45 | Validate that OIDC client creation fails when consentExpireInMins is provided as a string instead of a numeric value | 00:00:01 |
| TC_PMS_CreateOIDCClient_44 | Validate that OIDC client creation fails when an invalid value is provided for consentExpireInMins | 00:00:01 |
| TC_PMS_CreateOIDCClient_29 | Validate that OIDC client creation fails when invalid grant types are provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_19 | Validate that OIDC client creation fails when an invalid logo URI is provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_13 | Validate that OIDC client creation fails when an invalid public key is provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_22 | Validate that OIDC client creation fails when invalid redirect URLs are provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_36 | Validate that OIDC client creation fails when an invalid user response type is provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_16 | Validate that OIDC client creation fails when an invalid auth partner ID is provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_47 | Validate that OIDC client creation fails when an invalid client ID is provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_38 | Validate that OIDC client creation fails when an invalid client type is provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_21 | Validate that OIDC client creation fails when the logo URI contains special characters | 00:00:01 |
| TC_PMS_CreateOIDCClient_26 | Validate that OIDC client creation fails when multiple invalid grant types are provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_42 | Validate that OIDC client creation succeeds when signupBannerRequired is set to false | 00:00:01 |
| TC_PMS_CreateOIDCClient_10 | Validate that OIDC client creation fails when the policy ID contains special characters | 00:00:01 |
| TC_PMS_CreateOIDCClient_18 | Validate that OIDC client creation fails when the auth partner ID contains special characters | 00:00:01 |
| TC_PMS_CreateOIDCClient_31 | Validate that OIDC client creation succeeds when the client authentication methods contain only private_key_jwt | 00:00:01 |
| TC_PMS_CreateOIDCClient_53 | Validate that OIDC client creation fails when the client version is provided as an invalid integer | 00:00:01 |
| TC_PMS_CreateOIDCClient_52 | Validate that OIDC client creation fails when an invalid client version is provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_51 | Validate that OIDC client creation fails when the client version is null | 00:00:01 |
| TC_PMS_CreateOIDCClient_32 | Validate that OIDC client creation fails when client authentication methods are not provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_46 | Validate that OIDC client creation succeeds when consentExpireInMins is not provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_27 | Validate that OIDC client creation fails when grant types are not provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_20 | Validate that OIDC client creation fails when the logo URI is not provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_06 | Validate OIDC client creation fails when the name is not provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_12 | Validate that OIDC client creation fails when the policy ID is not provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_14 | Validate that OIDC client creation fails when the public key is not provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_23 | Validate that OIDC client creation fails when redirect URLs are not provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_54 | Validate that OIDC client creation fails when the request time is not provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_50 | Validate that OIDC client creation fails when the client version is not provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_17 | Validate that OIDC client creation fails when the auth partner ID is not provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_48 | Validate that OIDC client creation fails when the client ID is not provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_07 | Validate that an OIDC client is created successfully when a valid name is provided along with all other required parameters | 00:00:01 |
| TC_PMS_CreateOIDCClient_03 | Validate OIDC client creation with a valid name | 00:00:01 |
| TC_PMS_CreateOIDCClient_01 | Validate that an OIDC client is created successfully with all required valid inputs as part of a smoke test | 00:00:01 |
| TC_PMS_CreateOIDCClient_39 | Validate that OIDC client creation succeeds for all valid client types | 00:00:01 |
| TC_PMS_CreateOIDCClient_40 | Validate that OIDC client creation succeeds for all valid client types during login scenarios | 00:00:01 |
| TC_PMS_CreateOIDCClient_41 | Validate that OIDC client creation fails when the client type is empty | 00:00:01 |
| TC_PMS_CreateOIDCClient_43 | Validate that OIDC client creation succeeds when forgotPwdLinkRequired is set to false | 00:00:01 |
| TC_PMS_CreateOIDCClient_04 | Validate OIDC client creation fails with an invalid name | 00:00:01 |
| TC_PMS_CreateOIDCClient_08 | Validate that OIDC client creation fails when the name contains tab characters | 00:00:01 |
| TC_PMS_CreateOIDCClient_09 | Validate that OIDC client creation fails when an invalid policy ID is provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_02 | Validate that OIDC client creation fails when invalid authentication details are provided | 00:00:01 |
| TC_PMS_CreateOIDCClient_49 | Validate that OIDC client creation fails when the client ID is null | 00:00:01 |
| UpdateOIDCAuthClient — Passed | ||
| TC_PMS_UpdateOIDCClient_08 | Updating OAUTH Client empty client name | 00:00:01 |
| TC_PMS_UpdateOIDCClient_09 | Updating OAUTH Client with invalid client authentication method | 00:00:01 |
| TC_PMS_UpdateOIDCClient_17 | Updating OAUTH Client with invalid client name lang map format | 00:00:01 |
| TC_PMS_UpdateOIDCClient_15 | Updating OAUTH Client with invalid consent expire in mins format | 00:00:01 |
| TC_PMS_UpdateOIDCClient_14 | Updating OAUTH Client with invalid forgot password link required format | 00:00:01 |
| TC_PMS_UpdateOIDCClient_16 | Updating OAUTH Client with invalid grant type format | 00:00:01 |
| TC_PMS_UpdateOIDCClient_13 | Updating OAUTH Client with invalid signup banner required format | 00:00:01 |
| TC_PMS_UpdateOIDCClient_07 | Updating OAUTH Client with invalid status | 00:00:01 |
| TC_PMS_UpdateOIDCClient_12 | Updating OAUTH Client with invalid subtitle format | 00:00:01 |
| TC_PMS_UpdateOIDCClient_11 | Updating OAUTH Client with invalid type format | 00:00:01 |
| TC_PMS_UpdateOIDCClient_06 | Updating OAUTH Client with invalid userinfo response type | 00:00:01 |
| TC_PMS_UpdateOIDCClient_10 | Updating OAUTH Client with invalid userinfo response type format | 00:00:01 |
| TC_PMS_UpdateOIDCClient_04 | Updating OAUTH Client updating client name | 00:00:01 |
| TC_PMS_UpdateOIDCClient_05 | Updating OAUTH Client with empty client id | 00:00:01 |
| TC_PMS_UpdateOIDCClient_18 | Updating OAUTH Client without additional config request | 00:00:01 |
| TC_PMS_UpdateOIDCClient_02 | Updating OAUTH Client with invalid token | 00:00:01 |
| TC_PMS_UpdateOIDCClient_01 | Updating OAUTH Client | 00:00:01 |
| TC_PMS_UpdateOIDCClient_03 | Updating OAUTH Client updating logo url | 00:00:01 |
| DeactivateOIDCClientV2 — Passed | ||
| TC_PMS_DeactivateOIDCClientV2_01 | Validate that OIDC client deactivation succeeds for all valid clients | 00:00:01 |
| TC_PMS_DeactivateOIDCClientV2_02 | Validate that OIDC client deactivation succeeds when performed by a user with the Partner Admin role | 00:00:01 |
| DeactivateOIDCClientNegTC — Passed | ||
| TC_PMS_DeactivateOIDCClientV2NegTC_12 | Validate that OIDC client deactivation fails when the client ID is already deactivated | 00:00:01 |
| TC_PMS_DeactivateOIDCClientV2NegTC_03 | Validate that OIDC client deactivation fails when the client ID is empty | 00:00:01 |
| TC_PMS_DeactivateOIDCClientV2NegTC_07 | Validate that OIDC client deactivation fails when the request time is empty | 00:00:01 |
| TC_PMS_DeactivateOIDCClientV2NegTC_09 | Validate that OIDC client deactivation fails when the status is empty | 00:00:01 |
| TC_PMS_DeactivateOIDCClientV2NegTC_05 | Validate that OIDC client deactivation fails when the client version is empty | 00:00:01 |
| TC_PMS_DeactivateOIDCClientV2NegTC_01 | Validate that OIDC client deactivation fails when an invalid access token is used | 00:00:01 |
| TC_PMS_DeactivateOIDCClientV2NegTC_10 | Validate that OIDC client deactivation fails when an invalid client ID is provided | 00:00:01 |
| TC_PMS_DeactivateOIDCClientV2NegTC_02 | Validate that OIDC client deactivation fails when an invalid client ID is provided | 00:00:01 |
| TC_PMS_DeactivateOIDCClientV2NegTC_08 | Validate that OIDC client deactivation fails when an invalid status is provided | 00:00:01 |
| TC_PMS_DeactivateOIDCClientV2NegTC_04 | Validate that OIDC client deactivation fails when using a valid client ID with an invalid version | 00:00:01 |
| TC_PMS_DeactivateOIDCClientV2NegTC_06 | Validate that OIDC client deactivation fails when the request time provided is in the past | 00:00:01 |
| TC_PMS_DeactivateOIDCClientV2NegTC_11 | Validate that OIDC client deactivation fails when the client ID contains special characters | 00:00:01 |
| GetOIDCClient — Passed | ||
| TC_PMS_GetOIDCClientV2_01 | Validate that retrieving OIDC client details succeeds for all valid clients | 00:00:01 |
| TC_PMS_GetOIDCClientV2_02 | Validate that retrieving OIDC client details succeeds for users logged in with the Partner Admin role | 00:00:01 |
| TC_PMS_GetOIDCClientV2_05 | Validate that OIDC client details can be retrieved and sorted in ascending order by client name | 00:00:01 |
| TC_PMS_GetOIDCClientV2_03 | Validate that OIDC client details can be retrieved using a valid Partner ID | 00:00:01 |
| TC_PMS_GetOIDCClientV2_04 | Validate that OIDC client details can be retrieved using a valid Policy ID | 00:00:01 |
| TC_PMS_GetOIDCClientV2_06 | Validate that only OIDC clients with an active status are retrieved successfully | 00:00:01 |
| TC_PMS_GetOIDCClientV2_07 | Validate that only OIDC clients with an inactive status are retrieved successfully | 00:00:01 |
| GetOIDCClientNegTC — Passed | ||
| TC_PMS_GetOIDCClientV2NegTC_02 | Validate that retrieving OIDC client details fails when an access token from a different partner is used | 00:00:01 |
| TC_PMS_GetOIDCClientV2NegTC_01 | Validate that retrieving OIDC client details fails when an invalid access token is used | 00:00:01 |
| TC_PMS_GetOIDCClientV2NegTC_03 | Validate that retrieving OIDC client details fails when an invalid client name is provided | 00:00:01 |
| TC_PMS_GetOIDCClientV2NegTC_05 | Validate that retrieving OIDC client details fails when an invalid page number is provided | 00:00:01 |
| TC_PMS_GetOIDCClientV2NegTC_06 | Validate that retrieving OIDC client details fails when an invalid page size is provided | 00:00:01 |
| TC_PMS_GetOIDCClientV2NegTC_07 | Validate that retrieving OIDC client details fails when an invalid Partner ID is provided | 00:00:01 |
| TC_PMS_GetOIDCClientV2NegTC_08 | Validate that retrieving OIDC client details fails when an invalid policy group name is provided | 00:00:01 |
| TC_PMS_GetOIDCClientV2NegTC_09 | Validate that retrieving OIDC client details fails when an invalid policy name is provided | 00:00:01 |
| TC_PMS_GetOIDCClientV2NegTC_10 | Validate that retrieving OIDC client details fails when an invalid sort field name is provided | 00:00:01 |
| TC_PMS_GetOIDCClientV2NegTC_12 | Validate that retrieving OIDC client details fails when an invalid sort type is provided | 00:00:01 |
| TC_PMS_GetOIDCClientV2NegTC_13 | Validate that retrieving OIDC client details fails when an invalid status is provided | 00:00:01 |
| TC_PMS_GetOIDCClientV2NegTC_04 | Validate that retrieving OIDC client details fails when an invalid organization name is provided | 00:00:01 |
| TC_PMS_GetOIDCClientV2NegTC_14 | Validate that retrieving OIDC client details fails when a page number is provided without specifying the page size | 00:00:01 |
| TC_PMS_GetOIDCClientV2NegTC_11 | Validate that retrieving OIDC client details fails when a valid sort type is provided but the sort field name is missing | 00:00:01 |
| GetOIDCClientByClientId — Passed | ||
| TC_PMS_GetOIDCClientByClientIdV2_01 | Validate that OIDC client details can be retrieved successfully using a valid client ID | 00:00:01 |
| TC_PMS_GetOIDCClientByClientIdV2_03 | Validate that retrieving OIDC client details fails when the client ID is deactivated | 00:00:01 |
| TC_PMS_GetOIDCClientByClientIdV2_02 | Validate that OIDC client details can be retrieved using a valid client ID by a user with the Partner Admin role | 00:00:01 |
| GetOIDCClientByClientIdNegTC — Passed | ||
| TC_PMS_GetOIDCClientByClientIdV2NegTC_02 | Validate that retrieving OIDC client details fails when the client ID is null | 00:00:01 |
| TC_PMS_GetOIDCClientByClientIdV2NegTC_03 | Validate that retrieving OIDC client details fails when accessed by a user with a different partner role | 00:00:01 |
| TC_PMS_GetOIDCClientByClientIdV2NegTC_01 | Validate that retrieving OIDC client details by client ID fails when an invalid access token is used | 00:00:01 |
| TC_PMS_GetOIDCClientByClientIdV2NegTC_04 | Validate that retrieving OIDC client details fails when an invalid client ID is provided | 00:00:01 |
| TC_PMS_GetOIDCClientByClientIdV2NegTC_05 | Validate that retrieving OIDC client details fails when the client ID contains special characters | 00:00:01 |
| UpdateOAuthClient — Passed | ||
| TC_PMS_UpdateOIDCClient_01 | Validate that an OIDC client is updated successfully with all required valid inputs as part of a smoke test | 00:00:01 |
| GetAllOidcClient — Passed | ||
| TC_PMS_GetAllOidcClient_01 | Validate that all OIDC clients are successfully retrieved when a valid request with proper authorization is made | 00:00:01 |
| GetAllOidcClientWithoutAuthentication — Passed | ||
| TC_PMS_GetAllOidcClient_dummyauth_02 | Validate that retrieving OIDC clients fails when an invalid authorization token is provided | 00:00:01 |
| TC_PMS_GetAllOidcClient_noauth_01 | Validate that retrieving OIDC clients fails when the request is made without an authorization token | 00:00:01 |
| DeactivateOIDCClient — Passed | ||
| TC_PMS_DeactivateOIDCClient_03 | Validate that OIDC client deactivation fails when the request time is missing | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_11 | Validate that OIDC client deactivation fails when client authentication methods are missing | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_10 | Validate that OIDC client deactivation fails when the client name language map is missing | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_05 | Validate that OIDC client deactivation fails when the client name is missing | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_04 | Validate that OIDC client deactivation fails when the client ID is missing | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_09 | Validate that OIDC client deactivation fails when grant types are missing | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_07 | Validate that OIDC client deactivation fails when the logo URI is missing | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_08 | Validate that OIDC client deactivation fails when redirect URIs are missing | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_06 | Validate that OIDC client deactivation fails when the status is missing | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_02 | Validate that deactivation fails when retrying with an already deactivated OIDC client ID | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_01 | Validate that the OIDC client is successfully deactivated when all inputs are valid | 00:00:01 |
| GetAllOidcClientAfterDeactivateOfOIDC — Passed | ||
| TC_PMS_GetAllOidcClient_01 | Validate that all OIDC clients are successfully retrieved when a valid request with proper authorization is made | 00:00:01 |
| GetConfiguration — Passed | ||
| TC_PMS_GetConfiguration_01 | Validate that all partner configurations are successfully retrieved with valid inputs | 00:00:01 |
| GetUserConsentBeforeConsentGiven — Passed | ||
| TC_pms_GetUserConsent_05 | Validate that no consent status is returned for a user who has not yet given consent | 00:00:01 |
| saveUserConsent — Passed | ||
| TC_PMS_saveUserConsent_01 | Validate that user consent can be saved successfully with all valid inputs | 00:00:01 |
| TC_PMS_saveUserConsent_05 | Validate that a user consent can be saved successfully when the user has the Partner Admin role | 00:00:01 |
| TC_PMS_saveUserConsent_02 | Validate that saving user consent fails when the user has invalid roles | 00:00:01 |
| TC_PMS_saveUserConsent_04 | Validate that saving user consent fails when an invalid user is provided | 00:00:01 |
| TC_PMS_saveUserConsent_03 | Validate that saving user consent fails when authentication details are missing | 00:00:01 |
| GetUserConsent — Passed | ||
| TC_pms_GetUserConsent_04 | Validate that retrieving user consent status fails when an invalid token is provided | 00:00:01 |
| TC_pms_GetUserConsent_03 | Validate that retrieving user consent status fails when an invalid user ID is provided | 00:00:01 |
| TC_pms_GetUserConsent_02 | Validate that retrieving user consent status fails when no access token is provided | 00:00:01 |
| TC_pms_GetUserConsent_01 | Validate that all user consent records are retrieved successfully for a valid request | 00:00:01 |
| GetOriginalPartnerCertificates — Passed | ||
| TC_PMS_getPartner_certificate_02 | Validate that all original partner certificates for device providers are successfully retrieved with valid inputs | 00:00:01 |
| TC_PMS_getPartner_certificate_03 | Validate that all original partner certificates are retrieved successfully for a valid FTM Provider request | 00:00:01 |
| TC_PMS_getPartner_certificate_01 | Verify that all original partner certificates are successfully retrieved with valid inputs | 00:00:01 |
| TC_PMS_getPartner_certificate_04 | Validate that retrieving partner certificates fails when the user has invalid | 00:00:01 |
| TC_PMS_getPartner_certificate_06 | Validate that retrieving partner certificates fails when a random partner ID is provided | 00:00:01 |
| TC_PMS_getPartner_certificate_07 | Validate that retrieving partner certificates fails when no authentication is provided | 00:00:01 |
| TC_PMS_getPartner_certificate_05 | Validate that retrieving partner certificates fails when the partner ID is not provided | 00:00:01 |
| CreatePartner_MISP_Provider — Passed | ||
| TC_PMS_createPartnerSelfRegistration_misp_02 | Validate that a MISP license can be successfully registered through partner self registration with all required valid inputs as part of a smoke test | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_misp_03 | Validate that a MISP license can be successfully registered via MSIP through partner self registration as part of a smoke test | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_misp__01 | Validate that a MISP partner can successfully complete self registration with all required valid inputs as part of a smoke test | 00:00:01 |
| UploadCACertificate_MISP_Provider — Passed | ||
| TC_PMS_uploadcaCertMisp_03 | Upload valid CA certificate for Misp Partner - MISP2-AUTOMATION | 00:00:01 |
| TC_PMS_uploadcaCertMisp_05 | Upload valid CA certificate for Misp Partner - MISP3 | 00:00:01 |
| TC_PMS_uploadcaCertMisp_01 | Validate that a CA certificate is uploaded successfully with all required valid inputs, as part of a smoke test | 00:00:01 |
| TC_PMS_uploadsubcaCertMisp_04 | Upload valid SUBCA certificate for Misp Partner - MISP2-AUTOMATION | 00:00:01 |
| TC_PMS_uploadsubcaCertMisp_06 | Upload valid SUBCA certificate for Misp Partner - MISP3 | 00:00:01 |
| TC_PMS_uploadsubcaCertMisp_02 | Validate that a Sub-CA certificate is uploaded successfully with all required valid inputs as part of a smoke test | 00:00:01 |
| UploadPartnerCertificate_MISP_Provider — Passed | ||
| TC_PMS_UploadMispPartnerCert_01 | Validate that certificates are uploaded successfully with all required valid inputs as part of a smoke test | 00:00:02 |
| TC_PMS_UploadMispPartnerCert_02 | Validate that a MISP license certificate is uploaded successfully with all required valid inputs as part of a smoke test | 00:00:03 |
| TC_PMS_UploadMispPartnerCert_03 | Validate that a MISP3 license certificate is uploaded successfully with all required valid inputs as part of a smoke test | 00:00:04 |
| GetPartnerDetails_MISP_Provider — Passed | ||
| TC_PMS_getPartnerCert_01 | Validate that partner details are retrieved successfully with all required valid parameters as part of a smoke test | 00:00:01 |
| TC_PMS_getPartnerCert_02 | Validate that MISP3 partner details are retrieved successfully with all required valid parameters, as part of a smoke test | 00:00:01 |
| GetPartnerCertificate_MISP_Provider — Passed | ||
| TC_PMS_getMispPartnerCert_01 | Validate that partner certificates are retrieved successfully with all required valid parameters, as part of a smoke test | 00:00:01 |
| CreateDeviceDetail — Passed | ||
| TC_PMS_createServiceToSaveDeviceDetail_01 | Validate that device details are successfully saved with all valid inputs | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_05 | Validate that saving device details fails when the device already exists | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_06 | Validate that saving device details fails when the deviceId input parameter is missing | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_07 | Validate that saving device details fails when the deviceProviderId input parameter is missing | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_08 | Validate that saving device details fails when the deviceSubTypeCode input parameter is missing | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_09 | Validate that saving device details fails when the deviceTypeCode input parameter is missing | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_02 | Validate that device details are successfully saved when the make model and type are the same | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_03 | Validate that device details are successfully saved when the make and model are the same | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_04 | Validate that device details are successfully saved when the type and subtype are the same | 00:00:01 |
| RejectDeviceDetail — Passed | ||
| TC_PMS_rejectDeviceDetail_01 | Validate that device details are successfully rejected with all valid inputs | 00:00:01 |
| TC_PMS_rejectDeviceDetail_03 | Validate that device detail rejection fails when the approvalStatus input parameter is missing | 00:00:01 |
| TC_PMS_rejectDeviceDetail_04 | Validate that device detail rejection fails when the deviceId input parameter is missing | 00:00:01 |
| TC_PMS_rejectDeviceDetail_02 | Validate that device details are successfully rejected with valid inputs | 00:00:01 |
| ApproveDeviceDetail — Passed | ||
| TC_PMS_createApproveRejectDeviceDetail_01 | Validate that device details can be successfully approved or rejected with all valid inputs | 00:00:01 |
| TC_PMS_createApproveRejectDeviceDetail_02 | Validate that device detail approval/rejection fails when the approvalStatus input parameter is missing | 00:00:01 |
| TC_PMS_createApproveRejectDeviceDetail_03 | Validate that device detail approval/rejection fails when the deviceId input parameter is missing | 00:00:01 |
| UpdateDeviceDetail — Passed | ||
| TC_PMS_createServiceToUpdateDeviceDetail_01 | Validate that device details are successfully updated with all valid inputs | 00:00:01 |
| TC_PMS_createServiceToUpdateDeviceDetail_03 | Validate that device detail update fails when the deviceId input parameter is missing | 00:00:01 |
| TC_PMS_createServiceToUpdateDeviceDetail_04 | Validate that device detail update fails when the deviceProviderId input parameter is missing | 00:00:01 |
| TC_PMS_createServiceToUpdateDeviceDetail_05 | Validate that device detail update fails when the deviceSubTypeCode input parameter is missing | 00:00:01 |
| TC_PMS_createServiceToUpdateDeviceDetail_06 | Validate that device detail update fails when the deviceTypeCode input parameter is missing | 00:00:01 |
| TC_PMS_createServiceToUpdateDeviceDetail_02 | Validate that device details are successfully updated after rejection with all valid inputs | 00:00:01 |
| DeviceDetailsFilter — Passed | ||
| TC_PMS_DeviceDetailsFilter_06 | Validate that device detail filtering fails when the specified filter column does not exist | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_05 | Validate that device detail filtering fails when the filterColumn is empty | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_04 | Validate that device detail filtering fails when the filterType is empty | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_07 | Validate that device detail filtering fails when the specified filter type does not exist | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_02 | Validate that device details are correctly filtered for mapping to a Secure Biometric Interface | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_01 | Validate that device details are successfully filtered using valid criteria | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_03 | Validate that all device details are successfully filtered with valid inputs | 00:00:01 |
| createSearchDeviceType — Passed | ||
| TC_PMS_createSearchDeviceType_01 | Validate that device types can be searched successfully with all valid inputs | 00:00:01 |
| TC_PMS_createSearchDeviceType_02 | Validate that device types can be searched successfully using only filter criteria without sorting | 00:00:01 |
| TC_PMS_createSearchDeviceType_04 | Validate that device types can be searched successfully using only pagination criteria without filters | 00:00:01 |
| TC_PMS_createSearchDeviceType_05 | Validate that device types can be searched successfully with valid inputs | 00:00:01 |
| TC_PMS_createSearchDeviceType_03 | Validate that device types can be searched successfully using only sort criteria without filters | 00:00:01 |
| TC_PMS_createSearchDeviceType_10 | Validate that searching device types fails an error when an invalid sortField is provided | 00:00:01 |
| TC_PMS_createSearchDeviceType_08 | Validate that searching device types fails when an invalid sort type is provided | 00:00:01 |
| TC_PMS_createSearchDeviceType_06 | Validate that searching device types fails when the sort column name is missing | 00:00:01 |
| TC_PMS_createSearchDeviceType_11 | Validate device type search behavior when the sortField parameter is missing | 00:00:01 |
| TC_PMS_createSearchDeviceType_09 | Validate device type search with missing sortType parameter | 00:00:01 |
| TC_PMS_createSearchDeviceType_07 | Validate that searching device types fails when the sort type ascending is missing | 00:00:01 |
| createSearchDeviceDetails — Passed | ||
| TC_PMS_createSearchDeviceDetails_02 | Validate that device details can be searched successfully with all valid inputs | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_03 | Validate that device details can be searched successfully using only filter criteria without sorting | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_05 | Validate that device details can be searched successfully using only pagination criteria without filtering | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_04 | Validate that device details can be searched successfully using only sort criteria without filters | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_01 | Validate that device details can be searched and sorted successfully in descending order using valid inputs | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_06 | Validate that searching device details fails when an invalid sort column name is provided | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_10 | Validate that searching device details fails when an invalid sort field is provided | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_08 | Validate that searching device details fails when an invalid sort type is provided | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_11 | Validate that searching device details fails when the sort field is missing | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_09 | Validate that searching device details fails when the sort type is missing | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_07 | Validate that searching device details fails when the sort type descending is missing | 00:00:01 |
| GetListOfAllSBIBeforeAddingSBI — Passed | ||
| TC_PMS_SBI_List_21 | Validate that all SBIs existing before adding a new SBI are successfully retrieved when filtered by a valid SBI ID | 00:00:01 |
| SaveSecureBiometricInterfaceCreateDto — Passed | ||
| TC_PMS_createSaveSecureBiometricInterface_01 | Validate that secure biometric interface details can be created successfully by a device provider with all valid inputs | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_11 | Validate that a device provider can create secure biometric interface details successfully when associated with an FTM partner | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_10 | Validate that secure biometric interface details can be saved successfully with all valid inputs | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_06 | Validate that saving secure biometric interface fails when the partner ID is missing | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_05 | Validate that saving secure biometric interface fails when the software version is missing | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_07 | Validate that saving secure biometric interface fails when the partner ID contains only spaces | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_03 | Validate that secure biometric interface details can be saved successfully to enable mapping with valid inputs | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_09 | Validate that secure biometric interface details can be saved successfully for deactivation with valid inputs | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_08 | Validate that secure biometric interface details can be saved successfully for the reject flow with valid inputs | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_02 | Validate that secure biometric interface details can be saved successfully with valid inputs | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_04 | Validate that saving secure biometric interface fails when a duplicate software version is provided | 00:00:01 |
| RejectSecureBiometricInterface — Passed | ||
| TC_PMS_RejectSecureBiometricInterface_01 | Validate that a Secure Biometric Interface is successfully rejected with all valid inputs | 00:00:01 |
| TC_PMS_RejectSecureBiometricInterface_04 | Validate that SBI rejection fails when the approvalStatus input parameter is missing | 00:00:01 |
| TC_PMS_RejectSecureBiometricInterface_03 | Validate that SBI rejection fails when an invalid input is provided | 00:00:01 |
| ApproveSecureBiometricInterface — Passed | ||
| TC_PMS_ApproveSecureBiometricInterface_01 | Validate that a Secure Biometric Interface is successfully approved with all valid inputs | 00:00:01 |
| TC_PMS_ApproveSecureBiometricInterface_02 | Validate that SBI approval fails when the approvalStatus input parameter is missing | 00:00:01 |
| TC_PMS_ApproveSecureBiometricInterface_04 | Validate that a Secure Biometric Interface is successfully approved and ready for mapping | 00:00:01 |
| TC_PMS_ApproveSecureBiometricInterface_03 | Validate that a Secure Biometric Interface is successfully approved with valid inputs | 00:00:01 |
| UpdateSecureBiometricInterface — Passed | ||
| TC_PMS_createUpdateSecureBiometricInterface_04 | Validate that updating a Secure Biometric Interface fails after it has been rejected | 00:00:01 |
| TC_PMS_createUpdateSecureBiometricInterface_01 | Validate updating Secure Biometric Interface for a Device Provider with valid inputs succeeds | 00:00:01 |
| TC_PMS_createUpdateSecureBiometricInterface_03 | Validate that updating a Secure Biometric Interface fails when the id parameter is missing | 00:00:01 |
| TC_PMS_createUpdateSecureBiometricInterface_02 | Validate that re approving a Secure Biometric Interface fails when not allowed | 00:00:01 |
| TC_PMS_createUpdateSecureBiometricInterface_05 | Validate that updating a Secure Biometric Interface for an FTM Partner with valid inputs is successful | 00:00:01 |
| createSearchSecureBiometric — Passed | ||
| TC_PMS_createSearchSecureBiometric_01 | Validate that searching Secure Biometric records with all valid inputs returns the expected results successfully | 00:00:01 |
| TC_PMS_createSearchSecureBiometric_02 | Validate that searching Secure Biometric records using only filter criteria returns the expected results correctly | 00:00:01 |
| TC_PMS_createSearchSecureBiometric_04 | Validate that searching Secure Biometric records using only pagination criteria returns results correctly | 00:00:01 |
| TC_PMS_createSearchSecureBiometric_03 | Validate that searching Secure Biometric records using only sort criteria returns results correctly | 00:00:01 |
| TC_PMS_createSearchSecureBiometric_05 | Validate that searching Secure Biometric records with type containing a value sorted ascending by sid returns correct results | 00:00:01 |
| GetAllApprovedDeviceProviderIds — Passed | ||
| TC_PMS_GetAllApprovedDeviceProviders_05 | Validate that all approved device provider IDs are successfully retrieved with valid inputs | 00:00:01 |
| GetAllApprovedDeviceProviderIdsNegativeScenarios — Passed | ||
| TC_PMS_GetAllApprovedDeviceProviderIds_02 | Validate that retrieving all approved device provider IDs fails when an invalid authentication token is provided | 00:00:01 |
| TC_PMS_GetAllApprovedDeviceProviderIds_01 | Validate that retrieving all approved device provider IDs fails when authentication is not provided | 00:00:01 |
| TC_PMS_GetAllApprovedDeviceProviderIds_04 | Validate that retrieving all approved device provider IDs fails when the user has only admin roles | 00:00:01 |
| TC_PMS_GetAllApprovedDeviceProviderIds_03 | Validate that retrieving all approved device provider IDs fails when the user does not have partner roles | 00:00:01 |
| UpdateSBIID — Passed | ||
| TC_UpdateSBID_InsertQuery_03 | Validate that the SBI ID is successfully updated with a validity of 10 days when a valid request is submitted | 00:00:01 |
| TC_UpdateSBID_InsertQuery_02 | Validate that the SBI ID is successfully updated with a validity of 15 days when a valid request is submitted | 00:00:01 |
| TC_UpdateSBID_InsertQuery_01 | Validate that the SBI ID is successfully updated with a validity of 30 days when a valid request is submitted | 00:00:01 |
| GetSbiDetailsList — Passed | ||
| TC_pms_GetSbiDetailsList_01 | Validate that all SBI details are retrieved successfully for a valid request | 00:00:01 |
| TC_pms_GetSbiDetailsList_03 | Validate that retrieving a partner’s SBI details fails when accessed with an admin role instead of a partner role | 00:00:01 |
| TC_pms_GetSbiDetailsList_05 | Validate that retrieving SBI details fails when authentication is provided but the user has an invalid or unauthorized partner role | 00:00:01 |
| TC_pms_GetSbiDetailsList_06 | Validate that retrieving SBI details fails when the user has an FTM partner role instead of the required partner role | 00:00:01 |
| TC_pms_GetSbiDetailsList_04 | Validate that retrieving SBI details fails when the user does not have the required partner role | 00:00:01 |
| TC_pms_GetSbiDetailsList_02 | Validate that retrieving SBI details fails when no authorization token is provided | 00:00:01 |
| DeviceTypeFilter — Passed | ||
| TC_PMS_DeviceTypeFilter_02 | Validate that device types are successfully filtered with all valid inputs | 00:00:01 |
| TC_PMS_DeviceTypeFilter_05 | Validate that device type filtering fails when the specified filter column does not exist | 00:00:01 |
| TC_PMS_DeviceTypeFilter_04 | Validate that device type filtering fails when the filterColumn is empty | 00:00:01 |
| TC_PMS_DeviceTypeFilter_03 | Validate that device type filtering fails when the filterType is empty | 00:00:01 |
| TC_PMS_DeviceTypeFilter_06 | Validate that device type filtering fails when the specified filter type does not exist | 00:00:01 |
| DeviceSubTypeFilter — Passed | ||
| TC_PMS_DeviceSubTypeFilter_01 | Validate that device subtypes are successfully filtered with all valid inputs | 00:00:01 |
| TC_PMS_DeviceSubTypeFilter_02 | Validate that device subtypes are successfully filtered using the column code with valid inputs | 00:00:01 |
| TC_PMS_DeviceSubTypeFilter_06 | Validate that device subtype filtering fails when the specified filter column does not exist | 00:00:01 |
| TC_PMS_DeviceSubTypeFilter_04 | Validate that device subtype filtering fails when the filterColumn is empty | 00:00:01 |
| TC_PMS_DeviceSubTypeFilter_03 | Validate that device subtype filtering fails when the filterType is empty | 00:00:01 |
| TC_PMS_DeviceSubTypeFilter_05 | Validate that device subtype filtering fails when the specified filter type does not exist | 00:00:01 |
| SaveDeviceDetails — Passed | ||
| TC_PMS_SaveDeviceDetails_04 | Validate that device details can be saved successfully by a device provider for deactivation with all valid inputs | 00:00:01 |
| TC_PMS_SaveDeviceDetails_03 | Validate that device details can be saved successfully by a device provider for pending approval with all valid inputs | 00:00:01 |
| TC_PMS_SaveDeviceDetails_02 | Validate that device details can be saved successfully by a device provider for rejection flow with all valid inputs | 00:00:01 |
| TC_PMS_SaveDeviceDetails_01 | Validate that device details can be saved successfully by a device provider with all valid inputs | 00:00:01 |
| GetListOfAllSBI — Passed | ||
| TC_PMS_SBI_List_03 | Validate that all SBIs are successfully retrieved when a valid SBI ID is provided | 00:00:01 |
| TC_PMS_SBI_List_24 | Validate that SBIs expiring within 10 days are successfully retrieved | 00:00:01 |
| TC_PMS_SBI_List_23 | Validate that SBIs expiring within 15 days are successfully retrieved | 00:00:01 |
| TC_PMS_SBI_List_22 | Validate that SBIs expiring within 30 days are successfully retrieved when filtered by a valid SBI ID | 00:00:01 |
| TC_PMS_SBI_List_21 | Validate that SBIs are successfully retrieved for a partner when a valid device token is provided | 00:00:01 |
| TC_PMS_SBI_List_14 | Validate that SBIs are successfully retrieved when filtered by a valid orgName | 00:00:01 |
| TC_PMS_SBI_List_20 | Validate that SBIs are successfully retrieved when a valid page size is specified | 00:00:01 |
| TC_PMS_SBI_List_27 | Validate that SBIs are successfully retrieved when filtered by a valid partnerId and SBI ID | 00:00:01 |
| TC_PMS_SBI_List_18 | Validate that SBI retrieval fails when a random or invalid SBI ID is provided | 00:00:01 |
| TC_PMS_SBI_List_29 | Validate that SBIs with expiry status Expired are successfully retrieved | 00:00:01 |
| TC_PMS_SBI_List_28 | Validate that SBIs with expiry status Valid are successfully retrieved | 00:00:01 |
| TC_PMS_SBI_List_26 | Validate that SBIs are successfully retrieved when filtered by a valid SBI version | 00:00:01 |
| TC_PMS_SBI_List_25 | Validate that SBIs are successfully retrieved in ascending order when sorted by a valid sortType | 00:00:01 |
| TC_PMS_SBI_List_17 | Validate that SBIs are successfully retrieved in descending order when sorted by a valid sortType | 00:00:01 |
| TC_PMS_SBI_List_32 | Validate that SBIs with status Approved are successfully retrieved when filtered by a valid SBI ID | 00:00:01 |
| TC_PMS_SBI_List_31 | Validate that SBIs with status Deactivated are successfully retrieved | 00:00:01 |
| TC_PMS_SBI_List_30 | Validate that SBIs with status Pending Approval are successfully retrieved when filtered by a valid SBI ID | 00:00:01 |
| TC_PMS_SBI_List_33 | Validate that SBIs with status Rejected are successfully retrieved | 00:00:01 |
| ServiceToFilterSBI — Passed | ||
| TC_PMS_ServiceToFilterSBI_02 | Validate that all Secure Biometric Interfaces are successfully filtered with all valid inputs | 00:00:01 |
| TC_PMS_ServiceToFilterSBI_06 | Validate that SBI filtering fails when the specified column does not exist | 00:00:01 |
| TC_PMS_ServiceToFilterSBI_04 | Validate that SBI filtering fails when the column parameter is empty | 00:00:01 |
| TC_PMS_ServiceToFilterSBI_03 | Validate that SBI filtering fails when the type parameter is empty | 00:00:01 |
| TC_PMS_ServiceToFilterSBI_05 | Validate that SBI filtering fails when the specified type does not exist | 00:00:01 |
| TC_PMS_ServiceToFilterSBI_01 | Validate that Secure Biometric Interfaces (SBI) are successfully filtered with valid inputs | 00:00:01 |
| MapDeviceWithSBI — Passed | ||
| TC_PMS_MapDeviceWithSBI_01 | Validate that a device is successfully mapped with a Secure Biometric Interface with all valid inputs | 00:00:01 |
| TC_PMS_MapDeviceWithSBI_02 | Validate that multiple devices are successfully mapped with a Secure Biometric Interface with all valid inputs | 00:00:01 |
| TC_PMS_MapDeviceWithSBI_04 | Validate that multiple devices from different providers can be mapped to a Secure Biometric Interface | 00:00:01 |
| TC_PMS_MapDeviceWithSBI_03 | Validate that multiple devices can be mapped to a Secure Biometric Interface | 00:00:01 |
| RemoveMapDeviceWithSBI — Passed | ||
| TC_PMS_RemoveMapDeviceWithSBI_01 | Validate that a device is successfully unmapped from a Secure Biometric Interface with all valid inputs | 00:00:01 |
| ApproveMappingDeviceToSbi — Passed | ||
| TC_PMS_ApproveMappingDevice_01 | Validate that a device is successfully mapped to an SBI when all inputs are valid | 00:00:01 |
| TC_PMS_ApproveMappingDevice_02 | Validate that a device can be mapped to an SBI successfully even when the SBI is deactivated, using valid inputs | 00:00:01 |
| ApproveMappingDeviceToSbiNegativeScenarios — Passed | ||
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_01 | Validate that device mapping to an SBI fails when the provided device details do not match the expected SBI mapping | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_09 | Validate that device mapping to an SBI fails when the device has already been approved for the same SBI | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_10 | Validate that device mapping to an SBI fails when an invalid device ID is provided | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_13 | Validate that device mapping to an SBI fails when invalid partner authentication is provided | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_11 | Validate that device mapping to an SBI fails when an invalid or non-existent SBI ID is provided | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_08 | Validate that device mapping to an SBI fails when the SBI ID is missing | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_06 | Validate that device mapping to an SBI fails when a random or invalid device provider ID is provided | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_12 | Validate that device mapping to an SBI fails when partner authentication is not provided | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_03 | Validate that device mapping to an SBI fails when the request ID is missing | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_07 | Validate that device mapping to an SBI fails when request time is missing | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_02 | Validate that device mapping to an SBI fails when the SBI ID is missing | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_04 | Validate that device mapping to an SBI fails when the version value is missing | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_05 | Validate that device mapping to an SBI fails when the device provider ID is missing | 00:00:01 |
| RejectMappingDeviceToSbi — Passed | ||
| TC_PMS_RejectMappingDeviceToSbi_01 | Validate that mapping of a device to SBI can be rejected successfully with all valid inputs | 00:00:01 |
| RejectMappingDeviceToSbiwhichisRejected — Passed | ||
| TC_PMS_RejectMappingDeviceToSbi_32 | Validate that rejecting the mapping of a device to SBI fails when the mapping is already in a rejected state | 00:00:01 |
| RejectMappingDeviceToSbiNegativeScenarios — Passed | ||
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_03 | Validate that rejecting the mapping of a device to SBI fails when the request ID is null | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_29 | Validate that rejecting the mapping of a device to SBI fails when the device ID is empty | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_19 | Validate that rejecting the mapping of a device to SBI fails when the partner ID is empty | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_14 | Validate that rejecting the mapping of a device to SBI fails when the request time string is empty | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_13 | Validate that rejecting the mapping of a device to SBI fails when the request time is empty | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_23 | Validate that rejecting the mapping of a device to SBI fails when the SBI ID is empty | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_08 | Validate that Reject mapping device to sbi while keeping Version parameter as Empty in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_20 | Validate that rejecting the mapping of a device to SBI fails when an invalid SBI ID is provided | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_10 | Validate that Reject mapping device to sbi while keeping Version parameter as invalid value 0 in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_09 | Validate that Reject mapping device to sbi while keeping Version parameter as invalid value 1 in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_11 | Validate that Reject mapping device to sbi while keeping Version parameter as invalid values in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_02 | Validate that rejecting the mapping of a device to SBI fails when the required request ID is missing | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_06 | Validate that Reject mapping device to sbi while keeping Version parameter as Missing in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_07 | Validate that Reject mapping device to sbi while keeping Version parameter as Null in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_33 | Validate that rejecting the mapping of a device to SBI fails when a different SBI ID is provided | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_04 | Validate that rejecting the mapping of a device to SBI fails when the request ID is empty | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_05 | Validate that rejecting the mapping of a device to SBI fails when the request ID is invalid | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_25 | Validate that rejecting the mapping of a device to SBI fails when the mapping has already been rejected | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_15 | Validate that rejecting the mapping of a device to SBI fails when the request time is provided in an incorrect format | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_26 | Validate that rejecting the mapping of a device to SBI fails when an invalid device ID is provided | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_30 | Validate that rejecting the mapping of a device to SBI fails when invalid device ID values are provided | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_17 | Validate that rejecting the mapping of a device to SBI fails when an invalid partner ID is provided | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_16 | Validate that rejecting the mapping of a device to SBI fails when an invalid object parameter is provided | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_28 | Validate that rejecting the mapping of a device to SBI fails when the device ID is null | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_18 | Validate that rejecting the mapping of a device to SBI fails when the partner ID is null | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_22 | Validate that rejecting the mapping of a device to SBI fails when the SBI ID is null | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_24 | Validate that rejecting the mapping of a device to SBI fails when a random or invalid SBI ID is provided | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_31 | Validate that rejecting the mapping of a device to SBI fails when the partner role is not authorized to perform the action | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_27 | Validate that rejecting the mapping of a device to SBI fails when a device ID that does not match the request is provided | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_01 | Validate that rejecting the mapping of a device to SBI fails when partner authentication is missing | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_12 | Validate that rejecting the mapping of a device to SBI fails when the request time is missing | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_21 | Validate that rejecting the mapping of a device to SBI fails when the SBI ID is missing | 00:00:01 |
| ApproveMappingDeviceToSbiwhichisRejected — Passed | ||
| TC_PMS_ApproveMappingDevice_14 | Validate that device mapping to an SBI fails when the SBI has been rejected | 00:00:01 |
| GetAllDeviceListMappedWithSbi — Passed | ||
| TC_PMS_GetAllDeviceListMappedwithSbi_01 | Validate that all devices mapped with SBIs are successfully retrieved with valid inputs | 00:00:01 |
| GetAllDeviceListMappedWithSbiNegativeScenarios — Passed | ||
| TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_02 | Validate that retrieving devices mapped with SBIs fails when an invalid SBI ID is provided | 00:00:01 |
| TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_03 | Validate that retrieving devices mapped with SBIs fails when the SBI ID is not associated with an authenticated device provider | 00:00:01 |
| TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_01 | Validate that retrieving all devices mapped with SBIs fails when authentication is not provided | 00:00:01 |
| DeactivateSBIwhichisPendingforApproval — Passed | ||
| TC_PMS_DeactivateSBIWithAssociatedDevices_21 | Validate that SBI deactivation fails when the SBI is pending approval | 00:00:01 |
| GetPartnersPolicy — Passed | ||
| TC_PMS_GetPartnersPolicy_01 | Validate that all policies associated with partners are retrieved successfully for a valid request | 00:00:01 |
| TC_PMS_GetPartnersPolicy_02 | Validate that retrieving partner policies fails when an invalid partner ID is provided | 00:00:01 |
| GetAllPolicyGroup — Passed | ||
| TC_PMS_GetAllPolicyGroup_01 | Validate that all policy groups are successfully retrieved with valid inputs | 00:00:07 |
| CreateSearchPolicyGroup — Passed | ||
| TC_PMS_createSearchPolicyGroup_01 | Validate that searching Policy Groups with all valid inputs returns the expected results successfully | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_02 | Validate that searching Policy Groups using only filter criteria returns the expected results correctly | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_04 | Validate that searching Policy Groups using only pagination criteria returns results correctly | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_03 | Validate that searching Policy Groups using only sort criteria returns results correctly | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_12 | Validate that searching Policy Groups sorted by id in ascending order returns correct results | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_11 | Validate that searching Policy Groups sorted by id in descending order returns correct results | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_05 | Validate that searching Policy Groups with type containing a value sorted ascending by sid returns correct results | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_06 | Validate that searching Policy Groups with type containing a value sorted descending by sid returns correct results | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_08 | Validate that searching Policy Groups with type equal to a value sorted ascending by sid returns correct results | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_07 | Validate that searching Policy Groups with type equal to a value sorted descending by sid returns correct results | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_09 | Validate that searching Policy Groups with type starting with a value sorted ascending by sid returns correct results | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_10 | Validate that searching Policy Groups with type starting with a value sorted descending by sid returns correct results | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_13 | Validate that searching Policy Groups with the columnName parameter missing returns results using default behavior | 00:00:01 |
| PolicyGroupFilter — Passed | ||
| TC_PMS_PolicyGroupFilter_06 | Create Policy Group Filter for Partner while keeping invalid values in Column parameter | 00:00:01 |
| TC_PMS_PolicyGroupFilter_05 | Create Policy Group Filter for Partner while keeping ColumnName parameter as Empty | 00:00:01 |
| TC_PMS_PolicyGroupFilter_04 | Create Policy Group Filter for Partner while keeping FilterType parameter as Empty | 00:00:01 |
| TC_PMS_PolicyGroupFilter_07 | Create Policy Group Filter for Partner while keeping invalid values in Type parameter | 00:00:01 |
| TC_PMS_PolicyGroupFilter_02 | Create Policy Group Filter for Partner with valid values | 00:00:01 |
| TC_PMS_PolicyGroupFilter_01 | Validate that policy groups are successfully filtered using the name with valid inputs | 00:00:01 |
| TC_PMS_PolicyGroupFilter_03 | Create Policy Group Filter for Partner while keeping valid name for coulmnname parameter | 00:00:01 |
| GetValueForConfigKey — Passed | ||
| TC_PMS_GetValueForConfigKey_02 | Validate that all configuration key values are retrieved successfully for valid requests | 00:00:01 |
| PartnerFilter — Passed | ||
| TC_PMS_PartnerFilter_04 | Validate that partner filtering fails when the specified filter column does not exist. | 00:00:01 |
| TC_PMS_PartnerFilter_03 | Validate that partner filtering fails when the filterType is empty | 00:00:01 |
| TC_PMS_PartnerFilter_06 | Validate that partner filtering fails when the filter column is empty | 00:00:01 |
| TC_PMS_PartnerFilter_05 | Validate that partner filtering fails when the specified filter type does not exist | 00:00:01 |
| TC_PMS_PartnerFilter_02 | Validate that partners are successfully filtered with all valid inputs | 00:00:01 |
| TC_PMS_PartnerFilter_01 | Validate that partners are successfully filtered using unique criteria with all valid inputs | 00:00:01 |
| SearchPartnerApiKey — Passed | ||
| TC_PMS_SearchPartnerApiKey_01 | Validate that searching Partner API Keys with all valid inputs returns the expected results successfully | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_02 | Validate that searching Partner API Keys using only filter criteria returns the expected results correctly | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_04 | Validate that searching Partner API Keys using only pagination criteria returns results correctly | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_03 | Validate that searching Partner API Keys using only sort criteria returns results correctly | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_05 | Validate that searching Partner API Keys with type containing a value, sorted ascending by sid returns correct results | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_09 | Validate that searching Partner API Keys with type containing a value and an invalid column name returns an appropriate error | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_06 | Validate that searching Partner API Keys with type containing a value and invalid pagination parameters returns an appropriate error | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_07 | Validate that searching Partner API Keys with type containing a value and an invalid sortField returns an appropriate error | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_08 | Validate that searching Partner API Keys with type containing a value and an invalid sortType returns an appropriate error | 00:00:01 |
| SearchPartnerApiRequestKey — Passed | ||
| TC_PMS_SearchPartnerApiRequestKey_01 | Validate that searching Partner API Request Keys with all valid inputs returns the expected results successfully | 00:00:01 |
| TC_PMS_SearchPartnerApiRequestKey_02 | Validate that searching Partner API Request Keys using only filter criteria returns the expected results correctly | 00:00:01 |
| TC_PMS_SearchPartnerApiRequestKey_04 | Validate that searching Partner API Request Keys using only pagination criteria returns results correctly | 00:00:01 |
| TC_PMS_SearchPartnerApiRequestKey_03 | Validate that searching Partner API Request Keys using only sort criteria returns results correctly | 00:00:01 |
| TC_PMS_SearchPartnerApiRequestKey_05 | Validate that searching Partner API Request Keys with type containing a value sorted ascending by sid returns correct results | 00:00:01 |
| TC_PMS_SearchPartnerApiRequestKey_06 | Validate that searching Partner API Request Keys with type containing a value and invalid pagination parameters returns an appropriate error | 00:00:01 |
| PartnerApiKeyRequestFilter — Passed | ||
| TC_PMS_PartnerApiKeyRequestFilter_01 | Validate that partner API key requests are successfully filtered with all valid inputs | 00:00:01 |
| TC_PMS_PartnerApiKeyRequestFilter_05 | Validate that partner API key request filtering fails when the specified filter column does not exist | 00:00:01 |
| TC_PMS_PartnerApiKeyRequestFilter_04 | Validate that partner API key request filtering fails when the filterColumn is empty | 00:00:01 |
| TC_PMS_PartnerApiKeyRequestFilter_03 | Validate that partner API key request filtering fails when the filterType is empty | 00:00:01 |
| TC_PMS_PartnerApiKeyRequestFilter_06 | Validate that partner API key request filtering fails when the specified filter type does not exist | 00:00:01 |
| TC_PMS_PartnerApiKeyRequestFilter_02 | Validate that partner API key requests are successfully filtered using valid inputs | 00:00:01 |
| CreateSearchPartnerType — Passed | ||
| TC_PMS_createSearchPartnerType_02 | Validate that searching Partner Types with all valid inputs returns the expected results successfully | 00:00:01 |
| TC_PMS_createSearchPartnerType_03 | Validate that searching Partner Types using only filter criteria returns the expected results correctly | 00:00:01 |
| TC_PMS_createSearchPartnerType_05 | Validate that searching Partner Types using only pagination criteria returns results correctly | 00:00:01 |
| TC_PMS_createSearchPartnerType_04 | Validate that searching Partner Types using only sort criteria returns results correctly | 00:00:01 |
| TC_PMS_createSearchPartnerType_01 | Validate that searching Partner Types with type containing a value sorted in ascending order returns correct results | 00:00:01 |
| TC_PMS_createSearchPartnerType_06 | Validate that searching Partner Types with type containing a value sorted in descending order returns correct results | 00:00:01 |
| TC_PMS_createSearchPartnerType_08 | Validate that searching Partner Types with type equal to a value sorted in ascending order returns correct results | 00:00:01 |
| TC_PMS_createSearchPartnerType_07 | Validate that searching Partner Types with type equal to a value sorted in descending order returns correct results | 00:00:01 |
| TC_PMS_createSearchPartnerType_09 | Validate that searching Partner Types with type starting with a value sorted in ascending order returns correct results | 00:00:01 |
| TC_PMS_createSearchPartnerType_10 | Validate that searching Partner Types with type starting with a value sorted in descending order returns correct results | 00:00:01 |
| TC_PMS_createSearchPartnerType_13 | Validate that searching Partner Types with an invalid column name returns an appropriate error | 00:00:01 |
| TC_PMS_createSearchPartnerType_18 | Validate that searching Partner Types fails and returns an appropriate error when an invalid sortField is provided in the request | 00:00:01 |
| TC_PMS_createSearchPartnerType_16 | Validate that searching Partner Types with an invalid sortType returns an appropriate error | 00:00:01 |
| TC_PMS_createSearchPartnerType_11 | Validate that searching Partner Types with an invalid value using type equals returns no results | 00:00:01 |
| TC_PMS_createSearchPartnerType_12 | Validate that searching Partner Types with an invalid value using type starts with returns no results | 00:00:01 |
| TC_PMS_createSearchPartnerType_14 | Validate that searching Partner Types with the columnName parameter missing returns results using default behavior | 00:00:01 |
| TC_PMS_createSearchPartnerType_19 | Validate that searching Partner Types with the sortField parameter missing returns results using default sorting | 00:00:01 |
| TC_PMS_createSearchPartnerType_17 | Validate that searching Partner Types with the sortType parameter missing returns results using default sorting | 00:00:01 |
| TC_PMS_createSearchPartnerType_15 | Validate that searching Partner Types with the type parameter missing returns results using default behavior | 00:00:01 |
| GetAllApprovedFtmProvider — Passed | ||
| TC_PMS_GetAllApprovedFtmProvider_01 | Validate that all approved FTM providers are successfully retrieved with valid inputs | 00:00:01 |
| GetAllApprovedFtmProviderNegativeScenarios — Passed | ||
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_03 | Validate that retrieving all approved FTM providers fails when the CA certificate has not been uploaded | 00:00:01 |
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_04 | Validate that retrieving all approved FTM providers fails when the partner certificate has not been uploaded | 00:00:01 |
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_02 | Validate that retrieving all approved FTM providers fails when an invalid authentication token is provided | 00:00:01 |
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_01 | Validate that retrieving all approved FTM providers fails when authentication is not provided | 00:00:01 |
| GetListAllFTMChipNegativeScenarios — Passed | ||
| TC_PMS_GetListAllFTMChipNegativeScenarios_02 | Validate that FTM chip list retrieval fails when an invalid token is used | 00:00:01 |
| TC_PMS_GetListAllFTMChipNegativeScenarios_03 | Validate that the FTM chip list is empty when no FTM chips are added | 00:00:01 |
| TC_PMS_GetListAllFTMChipNegativeScenarios_04 | Validate that FTM chip list retrieval fails when accessed using an authenticated partner token that is not authorized | 00:00:01 |
| TC_PMS_GetListAllFTMChipNegativeScenarios_05 | Validate that FTM chip list retrieval fails when accessed using a device partner authentication token | 00:00:01 |
| TC_PMS_GetListAllFTMChipNegativeScenarios_01 | Validate that FTM chip list retrieval fails when no authentication is provided | 00:00:01 |
| CreateFtmChipDetails — Passed | ||
| TC_PMS_CreateFTPChipDetail_01 | Validate that FTP chip details are successfully created when all required inputs are valid | 00:00:01 |
| TC_PMS_CreateFTPChipDetail_03 | Validate that FTP chip detail creation fails when the FTP ID input parameter is missing | 00:00:01 |
| TC_PMS_CreateFTPChipDetail_02 | Validate that FTP chip detail creation fails when the FTP provider ID input parameter is missing | 00:00:01 |
| TC_PMS_createFtmChipDetails_01 | Validate that FTM chip details are successfully created for an FTM provider when all inputs are valid | 00:00:01 |
| UpdateFtpChipDetail — Passed | ||
| TC_PMS_UpdateFtpChipDetail_01 | Validate that updating FTM Chip details with all valid inputs is successful and the changes are reflected correctly | 00:00:01 |
| TC_PMS_UpdateFtpChipDetail_02 | Validate that updating FTM Chip details fails when the ftpChipDetailId parameter is missing | 00:00:01 |
| GetOriginalFtmCertifacteNegativeScenariosBeforeUploadCert — Passed | ||
| TC_PMS_GetOriginalFtmCertifacte_BeforecertUpload_01 | Validate that the API fails when partner certificates are not yet uploaded. | 00:00:01 |
| DeactivateFtmwhichisPendingforCertUpload — Passed | ||
| TC_PMS_DeactivateFtm_20 | Validate that FTM device deactivation fails when the device is pending certificate upload | 00:00:01 |
| GetOriginalFtmCertifacteforPendingforCertUpload — Passed | ||
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_07 | Validate that the API fails or returns appropriate errors when attempting to retrieve partner certificates that are still pending certificate upload | 00:00:01 |
| UploadCertificateOfFtpChip — Passed | ||
| TC_PMS_UploadCertificateOfFtpChip_01 | Validate that uploading a Certificate with all valid inputs for a given FTM/FTP Provider ID is successful | 00:00:01 |
| TC_PMS_UploadCertificateOfFtpChip_02 | Validate that uploading a Certificate fails when an invalid FTM Chip ID is provided | 00:00:01 |
| TC_PMS_UploadCertificateOfFtpChip_03 | Validate that uploading a Certificate fails when an invalid FTM/FTP Provider ID is provided | 00:00:01 |
| DeactivateFtmwhichisPendingforApproval — Passed | ||
| TC_PMS_DeactivateFtm_19 | Validate that FTM device deactivation fails when the device is still pending approval | 00:00:01 |
| ApproveFTMChipDetail — Passed | ||
| TC_PMS_ApproveFTMchipDetail_01 | Validate that a FTM chip detail is successfully approved when all inputs are valid | 00:00:01 |
| TC_PMS_ApproveFtpChipDetail_02 | Validate that FTP chip detail approval fails when the ftpChipDetailId input parameter is missing | 00:00:01 |
| RejectFtpChipDetail — Passed | ||
| TC_PMS_rejectFtpChipDetail_01 | Validate that FTM chip details can be rejected successfully with all valid inputs | 00:00:01 |
| TC_PMS_rejectFtpChipDetail_02 | Validate that rejecting FTM chip details fails when the ftpChipDetailId is missing | 00:00:01 |
| GetFTPChipDetail — Passed | ||
| TC_PMS_GetFTPChipDetail_01 | Validate that all FTM chip details are successfully retrieved with valid inputs | 00:00:01 |
| GetListAllFTMChip — Passed | ||
| TC_PMS_GetListAllFTMChip_01 | Validate that the list of all FTM chips is successfully retrieved with valid inputs | 00:00:01 |
| GetOriginalFtmCertifacte — Passed | ||
| TC_PMS_GetOriginalFtmCertifacte_01 | Validate that the API successfully retrieves all original partner certificates when valid inputs are provided | 00:00:01 |
| GetOriginalFtmCertifacteNegativeScenarios — Passed | ||
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_05 | Validate that the API fails to retrieve partner certificates when an invalid FTM ID is provided | 00:00:01 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_06 | Validate that the API fails to retrieve partner certificates when a invalid value is provided for the FTM ID | 00:00:01 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_04 | Validate that the API fails to retrieve partner certificates when the FTM ID contains spaces | 00:00:01 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_02 | Validate that the API fails to retrieve partner certificates when an invalid or expired access token is used | 00:00:01 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_01 | Validate that the API fails to retrieve partner certificates when no authentication is provided | 00:00:01 |
| GetListOfFtmChip — Passed | ||
| TC_PMS_FTM_chip_03 | Validate that all FTM chips are successfully retrieved with valid inputs | 00:00:01 |
| TC_PMS_FTM_chip_18 | Validate that FTM chips are successfully retrieved when filtered by a valid make | 00:00:01 |
| TC_PMS_FTM_chip_19 | Validate that FTM chips are successfully retrieved when filtered by a valid model | 00:00:01 |
| TC_PMS_FTM_chip_08 | Validate that FTM chips are successfully retrieved when filtered by a valid orgName | 00:00:01 |
| TC_PMS_FTM_chip_17 | Validate that FTM chips are successfully retrieved when a valid page size is specified | 00:00:01 |
| TC_PMS_FTM_chip_09 | Validate that FTM chips are successfully retrieved when filtered by a valid partnerId | 00:00:01 |
| TC_PMS_FTM_chip_20 | Validate that FTM chip retrieval fails when filtered with random values | 00:00:01 |
| TC_PMS_FTM_chip_06 | Validate that FTM chips are successfully retrieved in ascending order when sorted by a valid sortType | 00:00:01 |
| TC_PMS_FTM_chip_07 | Validate that FTM chips are successfully retrieved in descending order when sorted by a valid sortType | 00:00:01 |
| TC_PMS_FTM_chip_11 | Validate that FTM chips with status Approved are successfully retrieved | 00:00:01 |
| TC_PMS_FTM_chip_12 | Validate that FTM chips with status Deactivated are successfully retrieved | 00:00:01 |
| TC_PMS_FTM_chip_14 | Validate that FTM chips with status Pending Approval are successfully retrieved | 00:00:01 |
| TC_PMS_FTM_chip_13 | Validate that FTM chips with status Pending Certificate Upload are successfully retrieved | 00:00:01 |
| TC_PMS_FTM_chip_10 | Validate that FTM chips with status Rejected are successfully retrieved | 00:00:01 |
| TC_PMS_FTM_chip_21 | Validate that FTM chips are successfully retrieved when filtered using a combination of two fields | 00:00:01 |
| GetListOfFtmChipNegativeScenarios — Passed | ||
| TC_PMS_FTM_chip_16 | Validate that FTM chip list retrieval fails when a negative page number is provided | 00:00:01 |
| TC_PMS_FTM_chip_15 | Validate that FTM chip list retrieval fails when a negative page size is provided | 00:00:01 |
| TC_PMS_FTM_chip_05 | Validate that FTM chip list retrieval fails when an invalid sort type is provided | 00:00:01 |
| TC_PMS_FTM_chip_04 | Validate that FTM chip list retrieval fails when an invalid sort field is provided | 00:00:01 |
| TC_PMS_FTM_chip_02 | Validate that FTM chip list retrieval fails when an invalid token is used | 00:00:01 |
| TC_PMS_FTM_chip_01 | Validate that FTM chip list retrieval fails when no authentication is provided | 00:00:01 |
| GetListOfAllSBINegativeScenarios — Passed | ||
| TC_PMS_SBI_List_11 | Validate that SBI list retrieval fails when an invalid orgName is provided | 00:00:01 |
| TC_PMS_SBI_List_12 | Validate that SBI list retrieval fails when an invalid SBI ID is provided | 00:00:01 |
| TC_PMS_SBI_List_13 | Validate that SBI list retrieval fails when an invalid SBI version is provided | 00:00:01 |
| TC_PMS_SBI_List_15 | Validate that SBI list retrieval fails when only the sort field name is provided without sort type | 00:00:01 |
| TC_PMS_SBI_List_16 | Validate that SBI list retrieval fails when only the sort type is provided without a sort field name | 00:00:01 |
| TC_PMS_SBI_List_10 | Validate that SBI list retrieval fails when the SBI version contains special characters | 00:00:01 |
| TC_PMS_SBI_List_08 | Validate that SBI list retrieval fails when an invalid partnerId is provided | 00:00:01 |
| TC_PMS_SBI_List_09 | Validate that SBI list retrieval fails when an invalid sort field name is provided | 00:00:01 |
| TC_PMS_SBI_List_05 | Validate that SBI list retrieval fails when an invalid sort type is provided | 00:00:01 |
| TC_PMS_SBI_List_04 | Validate that SBI list retrieval fails when an invalid sort field is provided | 00:00:01 |
| TC_PMS_SBI_List_02 | Validate that retrieving the list of all SBIs fails with an invalid or expired token | 00:00:01 |
| TC_PMS_SBI_List_07 | Validate that SBI list retrieval fails when a negative page number is provided | 00:00:01 |
| TC_PMS_SBI_List_06 | Validate that SBI list retrieval fails when a negative page size is provided | 00:00:01 |
| TC_PMS_SBI_List_01 | Validate that retrieving the list of all SBIs fails without authentication | 00:00:01 |
| GetListOfAllDevice — Passed | ||
| TC_PMS_devicedetails_01 | Validate that the list of all devices is successfully retrieved with valid inputs | 00:00:01 |
| TC_PMS_devicedetails_22 | Validate that a device is successfully retrieved when filtered by a valid device ID | 00:00:01 |
| TC_PMS_devicedetails_24 | Validate that device retrieval fails when a random or invalid device ID is provided | 00:00:01 |
| TC_PMS_devicedetails_18 | Validate that devices are successfully retrieved when filtered by a valid deviceSubType | 00:00:01 |
| TC_PMS_devicedetails_17 | Validate that devices are successfully retrieved when filtered by a valid deviceType | 00:00:01 |
| TC_PMS_devicedetails_16 | Validate that device list retrieval fails when an invalid sortField is provided | 00:00:01 |
| TC_PMS_devicedetails_12 | Validate that device list retrieval fails when an invalid sortType is provided | 00:00:01 |
| TC_PMS_devicedetails_03 | Validate that retrieving the list of all devices fails with an invalid token | 00:00:01 |
| TC_PMS_devicedetails_19 | Validate that devices are successfully retrieved when filtered by a valid make | 00:00:01 |
| TC_PMS_devicedetails_20 | Validate that devices are successfully retrieved when filtered by a valid model | 00:00:01 |
| TC_PMS_devicedetails_23 | Validate that devices are successfully retrieved when filtered using multiple attribute values | 00:00:01 |
| TC_PMS_devicedetails_05 | Validate that device list retrieval fails when a negative page number is provided | 00:00:01 |
| TC_PMS_devicedetails_06 | Validate that device list retrieval fails when a negative page size is provided | 00:00:01 |
| TC_PMS_devicedetails_21 | Validate that devices are successfully retrieved when filtered by a valid SBI ID | 00:00:01 |
| TC_PMS_devicedetails_15 | Validate that devices are successfully retrieved when filtered by a valid SBI version | 00:00:01 |
| TC_PMS_devicedetails_13 | Validate that devices are successfully retrieved in ascending order when sorted by a valid sortType | 00:00:01 |
| TC_PMS_devicedetails_14 | Validate that devices are successfully retrieved in descending order when sorted by a valid sortType | 00:00:01 |
| TC_PMS_devicedetails_25 | Validate that devices are successfully retrieved when filtered by a valid orgName | 00:00:01 |
| TC_PMS_devicedetails_04 | Validate that the list of all devices is retrieved successfully when a page size is specified | 00:00:01 |
| TC_PMS_devicedetails_11 | Validate that devices are successfully retrieved when filtered by a valid partnerId | 00:00:01 |
| TC_PMS_devicedetails_08 | Validate that devices with status Approved are successfully retrieved | 00:00:01 |
| TC_PMS_devicedetails_09 | Validate that devices with status Deactivated are successfully retrieved | 00:00:01 |
| TC_PMS_devicedetails_10 | Validate that devices with status Pending Approval are successfully retrieved | 00:00:01 |
| TC_PMS_devicedetails_07 | Validate that devices with status Rejected are successfully retrieved | 00:00:01 |
| TC_PMS_devicedetails_02 | Validate that retrieving the list of all devices fails without authentication | 00:00:01 |
| GetCountOfFtm — Passed | ||
| Pms_GetCountOfFtm_All_Valid_Smoke | Validate that the total count of FTM records is successfully retrieved with valid inputs | 00:00:01 |
| GetAllSystemConfigs — Passed | ||
| TC_PMS_GetAllSystemConfigs_01 | Validate that all system configurations are successfully retrieved with valid inputs | 00:00:01 |
| TC_PMS_GetAllSystemConfigs_02 | Validate that system configuration retrieval fails when no authentication is provided | 00:00:01 |
| GetAllRootCertificate — Passed | ||
| TC_PMS_getAllRootCertificate_01 | Validate that all root certificates are successfully retrieved with valid inputs | 00:00:01 |
| GetListOfApiKey — Passed | ||
| TC_PMS_GetListOfApiKey_01 | Validate that the list of all API keys is successfully retrieved with valid inputs | 00:00:01 |
| TC_PMS_GetListOfApiKey_03 | Validate that API key list retrieval fails when accessed using an individual partner token | 00:00:01 |
| TC_PMS_GetListOfApiKey_04 | Validate that API key list retrieval fails when an invalid page size is provided | 00:00:01 |
| TC_PMS_GetListOfApiKey_11 | Validate that API key list retrieval fails when an invalid sort type is provided | 00:00:01 |
| TC_PMS_GetListOfApiKey_05 | Validate that API key list retrieval fails when a negative page number is provided | 00:00:01 |
| TC_PMS_GetListOfApiKey_06 | Validate that API key list retrieval fails when a negative page size is provided | 00:00:01 |
| TC_PMS_GetListOfApiKey_16 | Validate that API key retrieval fails or returns no results when filtered with a partial apiKeyLabel value | 00:00:01 |
| TC_PMS_GetListOfApiKey_14 | Validate that API key retrieval fails or returns no results when filtered with a partial orgName value | 00:00:01 |
| TC_PMS_GetListOfApiKey_09 | Validate that API key retrieval fails or returns no results when filtered with a partial partnerId value | 00:00:01 |
| TC_PMS_GetListOfApiKey_10 | Validate that API key retrieval fails or returns no results when filtered with a partial policyGroupName value | 00:00:01 |
| TC_PMS_GetListOfApiKey_15 | Validate that API key retrieval fails or returns no results when filtered with a partial policyName value | 00:00:01 |
| TC_PMS_GetListOfApiKey_17 | Validate that API key retrieval fails or returns no results when filtered with random data | 00:00:01 |
| TC_PMS_GetListOfApiKey_07 | Validate that API keys with status Activated are successfully retrieved | 00:00:01 |
| TC_PMS_GetListOfApiKey_08 | Validate that API keys with status Deactivated are successfully retrieved | 00:00:01 |
| TC_PMS_GetListOfApiKey_12 | Validate that API keys are successfully retrieved in ascending order when a valid sort type is provided | 00:00:01 |
| TC_PMS_GetListOfApiKey_13 | Validate that API keys are successfully retrieved in descending order when a valid sort type is provided | 00:00:01 |
| TC_PMS_GetListOfApiKey_02 | Validate that API key list retrieval fails without authentication | 00:00:01 |
| DownloadRootCertificate — Passed | ||
| TC_PMS_DownloadRootCertificate_01 | Validate that the root certificate is successfully downloaded with all valid inputs | 00:00:01 |
| GenerateMISPPartnerLicense — Passed | ||
| TC_PMS_GenerateMISPPartnerLicense_01 | Validate that a MISP partner license is successfully generated with a valid SID when all inputs are valid | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicense_02 | Validate that a MISP partner license is successfully generated with a valid SID even when the policy ID is not provided | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicense_06 | Validate that generating a MISP partner license fails when the policy ID is left empty even if a valid SID is provided | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicense_05 | Validate that a MISP partner license is successfully generated when a valid license key name is provided along with a valid SID | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicense_04 | Validate that a MISP partner license is successfully generated when the license key name contains numeric characters | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicense_03 | Validate that generating a MISP partner license fails when the policy group is not provided | 00:00:01 |
| GenerateMISPPartnerLicenseNegativeScenarios — Passed | ||
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_20 | Validate that generating a MISP partner license fails when the license key name has already been registered | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_17 | Validate that generating a MISP partner license fails when the license key name is left empty | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_05 | Validate that generating a MISP partner license fails when the request ID is left empty | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_18 | Validate that generating a MISP partner license fails when the expiry date is left empty | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_14 | Validate that generating a MISP partner license fails when the partner ID is left empty | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_02 | Validate that generating a MISP partner license fails when an invalid request ID is provided | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_06 | Validate that generating a MISP partner license fails when an invalid version is provided | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_13 | Validate that generating a MISP partner license fails when an invalid partner ID is provided | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_04 | Validate that generating a MISP partner license fails when the request ID is null | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_08 | Validate that generating a MISP partner license fails when the version is set to null | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_19 | Validate that generating a MISP partner license fails when the expiry date is set in the past | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_10 | Validate that generating a MISP partner license fails when an invalid version value 0 is provided | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_09 | Validate that generating a MISP partner license fails when an unsupported version value 1 is provided | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_16 | Validate that generating a MISP partner license fails when an invalid license key name is provided | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_15 | Validate that generating a MISP partner license fails when the partner ID is set to null | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_11 | Validate that generating a MISP partner license fails when the request time is set in the past | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_01 | Validate that generating a MISP partner license fails when no access token is provided | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_03 | Validate that generating a MISP partner license fails when the request ID is not provided | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_07 | Validate that generating a MISP partner license fails when the version is not provided | 00:00:01 |
| TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_12 | Validate that generating a MISP partner license fails when the request time is not provided | 00:00:01 |
| DeactivateMISPLicense — Passed | ||
| TC_PMS_DeactivateMISPLicense_01 | Validate that the MISP license is successfully deactivated with valid inputs | 00:00:01 |
| DeactivateMISPPartner — Passed | ||
| TC_PMS_DeactivateMISPPartner_01 | Validate that the MISP partner is successfully deactivated with valid inputs | 00:00:01 |
| GetMISPPartnerLicense — Passed | ||
| TC_PMS_GetMISPPartnerLicense_01 | Validate that all MISP partner licenses are retrieved successfully for a valid request | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_03 | Validate that the MISP partner license is retrieved successfully for a valid Partner ID | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_18 | Validate that the MISP partner license is retrieved successfully for a valid partner ID with status set to Activated | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_19 | Validate that the MISP partner license is retrieved successfully for a valid partner ID with status set to Deactivated | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_25 | Validate that the MISP partner licenses are retrieved successfully when filtering using a numeric license key name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_24 | Validate that the MISP partner licenses are retrieved successfully when a page size is provided but no page number is specified | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_20 | Validate that the MISP partner licenses are retrieved successfully for a valid partner ID using pagination parameters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_21 | Validate that the MISP partner licenses are retrieved successfully when filtering by both a valid partner ID and policy name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_29 | Validate that the MISP partner licenses are retrieved successfully when filtering by policy group name with status set to Activated | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_27 | Validate that the MISP partner licenses are retrieved successfully when filtering by policy name and using pagination parameters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_28 | Validate that the MISP partner licenses are retrieved successfully when filtering by both policy name and a valid organization name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_11 | Validate that the MISP partner licenses are retrieved successfully using default pagination settings when no pagination parameters are provided | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_14 | Validate that the MISP partner licenses are retrieved successfully when the expiryPeriod parameter is not provided | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_15 | Validate that the MISP partner licenses are retrieved successfully when a valid expiryPeriod value is provided | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_17 | Validate that the MISP partner licenses are retrieved successfully when the maximum allowed expiryPeriod value is provided | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_16 | Validate that the MISP partner licenses are retrieved successfully when the minimum allowed expiryPeriod value is provided | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_09 | Validate that the MISP partner licenses are retrieved successfully when filtering by MISP license key name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_02 | Validate that all MISP partner licenses are retrieved successfully when no filter criteria are applied | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_06 | Validate that the MISP partner licenses are retrieved successfully when filtering by organization name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_10 | Validate that the MISP partner licenses are retrieved successfully using pagination parameters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_07 | Validate that the MISP partner licenses are retrieved successfully when filtering by policy group name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_08 | Validate that the MISP partner licenses are retrieved successfully when filtering by policy name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_12 | Validate that the MISP partner licenses are retrieved successfully when sorted by the specified sort field in ascending order | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_13 | Validate that the MISP partner licenses are retrieved successfully when sorted by the specified sort field in descending order | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_22 | Validate that the MISP partner licenses are retrieved successfully when sorted by ExpiryDateTime in ascending order | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_23 | Validate that the MISP partner licenses are retrieved successfully when sorted by ExpiryDateTime in descending order | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_26 | Validate that the MISP partner licenses are retrieved successfully when sorted by PartnerId in ascending order | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_04 | Validate that the MISP partner licenses are retrieved successfully when the status filter is set to Activated | 00:00:01 |
| TC_PMS_GetMISPPartnerLicense_05 | Validate that the MISP partner licenses are retrieved successfully when the status filter is set to Deactivate | 00:00:01 |
| GetMISPPartnerLicenseNegTC — Passed | ||
| TC_PMS_GetMISPPartnerLicenseNegTC_41 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a deactivated partner ID | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_27 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a decimal value for the expiryPeriod parameter | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_34 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a decimal value for the page number | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_22 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an empty string for the policy group name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_23 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an empty string for the policy name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_26 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an expiryPeriod value exceeding the maximum allowed limit | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_28 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an inactive partner ID | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_10 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid MISP license key name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_04 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid organization name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_17 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid page number format | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_12 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid page number | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_14 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid page size format | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_02 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid partner ID | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_06 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid policy group name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_08 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid policy name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_29 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid sort field name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_39 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an excessively large page size value | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_25 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a negative expiryPeriod value | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_13 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a negative page number | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_16 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a negative page size | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_36 | Validate that the API returns an error when attempting to retrieve MISP partner licenses without selecting any status filter | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_33 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a non-integer value for the page number | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_40 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a non-integer value for the page size | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_37 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a null value for the organization name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_30 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a numeric value as the sort field name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_24 | Validate that the API returns an error when attempting to retrieve MISP partner licenses by providing a sort field name without specifying a sort type | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_20 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a valid sort field name but an invalid sort type | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_19 | Validate that the API returns an error when attempting to retrieve MISP partner licenses by providing a sort type without specifying a sort field name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_32 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using special characters in the sort type parameter | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_11 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a MISP license key name containing special characters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_05 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an organization name containing special characters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_03 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a partner ID containing special characters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_07 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a policy group name containing special characters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_09 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a policy name containing special characters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_21 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a sort field name containing special characters | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_31 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an unsupported sort type value | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_18 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a valid organization name but an invalid policy group name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_38 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a valid policy name but an invalid organization name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_35 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an excessively large page number | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_15 | Validate that the API returns an error when attempting to retrieve MISP partner licenses with a page size of zero | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseNegTC_01 | Validate that the API returns an error when attempting to retrieve MISP partner licenses without providing an access token | 00:00:01 |
| GetMISPPartnerLicenseByPartnerId — Passed | ||
| TC_PMS_GetMISPPartnerLicenseByPartnerId_01 | Validate that the MISP partner licenses are retrieved successfully for a valid partner ID with all required parameters as part of a smoke test | 00:00:01 |
| GetMISPPartnerLicenseByPartnerIdNegTC — Passed | ||
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_04 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a partner ID that is not authorized | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_07 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a partner ID belonging to a different organization | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_01 | Validate that the API returns an error when attempting to retrieve MISP partner licenses by partner ID using an invalid access token | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_03 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid partner ID | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_06 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a partner ID that is not registered | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_08 | Validate that the API returns an error when attempting to retrieve MISP partner licenses for a partner ID whose certificate has not been uploaded | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_05 | Validate that the API returns an error when attempting to retrieve MISP partner licenses using a valid partner ID but without providing a license key name | 00:00:01 |
| TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_02 | Validate that the API returns an error when attempting to retrieve MISP partner licenses with a null partner ID | 00:00:01 |
| SearchMispLicense — Passed | ||
| TC_PMS_SearchMispLicense_07 | Validate that retrieving MISP licenses fails when the sort field is left blank in the search request | 00:00:01 |
| TC_PMS_SearchMispLicense_03 | Validate that retrieving MISP licenses fails when an invalid or negative page number is provided for pagination | 00:00:01 |
| TC_PMS_SearchMispLicense_04 | Validate that retrieving MISP licenses fails when an invalid start page value is provided for pagination | 00:00:01 |
| TC_PMS_SearchMispLicense_06 | Validate that retrieving MISP licenses fails when an invalid sort field is provided in the search request | 00:00:01 |
| TC_PMS_SearchMispLicense_05 | Validate that retrieving MISP licenses fails when an invalid sort type is provided in the search request | 00:00:01 |
| TC_PMS_SearchMispLicense_02 | Validate that MISP licenses are retrieved successfully when searched using a valid filter by name | 00:00:01 |
| TC_PMS_SearchMispLicense_01 | Validate that MISP licenses are retrieved successfully when searched using valid search criteria | 00:00:01 |
| FilterMispLicense — Passed | ||
| TC_PMS_FilterMispLicense_01 | Validate that all MISP licenses are retrieved successfully when a valid filter request is submitted | 00:00:01 |
| TC_PMS_FilterMispLicense_04 | Validate that retrieving MISP licenses fails when the filter type is left blank | 00:00:01 |
| TC_PMS_FilterMispLicense_06 | Validate that retrieving MISP licenses fails when the column name in the filter is left empty | 00:00:01 |
| TC_PMS_FilterMispLicense_03 | Validate that retrieving MISP licenses fails when an invalid filter type is provided | 00:00:01 |
| TC_PMS_FilterMispLicense_05 | Validate that retrieving MISP licenses fails when an invalid column name is provided in the filter | 00:00:01 |
| TC_PMS_FilterMispLicense_02 | Validate that MISP licenses are retrieved successfully when filtered using valid criteria | 00:00:01 |
| GetPartnerApiKeyRequest — Passed | ||
| TC_PMS_GetPartnerApiKeyRequest_01 | Validate that retrieving API key requests fails when an invalid partner ID is provided | 00:00:01 |
| GetBioExtractors — Passed | ||
| TC_PMS_GetBioExtractors_02 | Validate that bio extractor retrieval fails no data when an invalid partnerId is provided | 00:00:01 |
| TC_PMS_GetBioExtractors_01 | Validate that all bio extractor details are successfully retrieved with valid inputs | 00:00:01 |
| CreateBioExtractors — Passed | ||
| TC_PMS_CreateBioExtractors_02 | Validate that bio extractor creation fails when an invalid policy ID is provided | 00:00:01 |
| TC_PMS_CreateBioExtractors_01 | Validate that bio extractor creation fails when an invalid partner ID is provided | 00:00:01 |
| MapPartnerAndPolicytoCredentialType — Passed | ||
| TC_PMS_MapPartnerAndPolicytoCredentialType_01 | Validate that a partner and policy are successfully mapped to a credential type when a valid request is submitted | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_04 | Validate that mapping a partner and policy to a credential type fails when an invalid credential type is provided | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_02 | Validate that mapping a partner and policy to a credential type fails when an invalid or non-existent partner ID is provided | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_03 | Validate that mapping a partner and policy to a credential type fails when an invalid policy ID is provided | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_05 | Validate that mapping a partner and credential type to an inactive policy fails | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_07 | Create Mapping between Partner and Policy to CredentialType Partner while keeping not allowed partner | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_06 | Validate that mapping a partner and policy to a credential type fails when a duplicate mapping already exists | 00:00:01 |
| GetPolicyforMappedPartnerAndCredentialtype — Passed | ||
| TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_01 | Validate that all policies are retrieved successfully for a valid partner and credential type mapping | 00:00:01 |
| TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_03 | Validate that retrieving policies fails when an invalid credential type is provided for a partner–credential type mapping | 00:00:01 |
| TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_02 | Validate that retrieving policies fails when an invalid partner ID is provided for a partner–credential type mapping | 00:00:01 |
| GetRoles — Passed | ||
| TC_PMS_GetRoles_01 | Validate that all user roles are retrieved successfully for a valid request | 00:00:01 |
| ActivateDeactivatePartner — Passed | ||
| TC_PMS_ActivateDeactivatePartner_05 | Validate that an inactive partner is successfully activated when a valid activate request is submitted | 00:00:01 |
| TC_PMS_ActivateDeactivatePartner_02 | Validate that a MISP3 partner is successfully deactivated when a valid deactivate request is submitted | 00:00:01 |
| TC_PMS_ActivateDeactivatePartner_03 | Validate that the partner with ID Tech-1233 is successfully deactivated when a valid deactivate request is submitted | 00:00:01 |
| TC_PMS_ActivateDeactivatePartner_04 | Validate that the partner with ID Tech_321 is successfully deactivated when a valid deactivate request is submitted | 00:00:01 |
| TC_PMS_ActivateDeactivatePartner_01 | Validate that an active partner is successfully deactivated when a valid deactivate request is submitted | 00:00:01 |
| TC_PMS_ActivateDeactivatePartner_06 | Validate that partner activation or deactivation fails when an invalid partner ID is provided | 00:00:01 |
| GetApiKeyRequests — Passed | ||
| TC_PMS_GetApiKeyRequests_01 | Validate that all API key requests are successfully retrieved with valid inputs | 00:00:01 |
| AuditLogGenerateApiKey — Passed | ||
| TC_PMS_addContact_01 | Validate that a contact is successfully added when all input parameters are valid | 00:00:01 |
| GetPolicyForApiKey — Passed | ||
| TC_PMS_GetPolicyForApiKey_03 | Validate that retrieving policies fails when an invalid API key is provided | 00:00:01 |
| TC_PMS_GetPolicyForApiKey_02 | Validate that retrieving policies for an API key fails when an invalid partner ID is provided | 00:00:01 |
| TC_PMS_GetPolicyForApiKey_01 | Validate that all policies associated with a valid API key are retrieved successfully | 00:00:01 |
| UpdatePolicyAgainstApiKey — Passed | ||
| TC_PMS_UpdatePolicyAgainstApiKey_01 | Validate that updating a Policy against an API Key with all valid inputs is successful and the changes are reflected correctly | 00:00:01 |
| TC_PMS_UpdatePolicyAgainstApiKey_04 | Validate that updating a Policy against an API Key fails when an invalid oldPolicyId is provided | 00:00:01 |
| TC_PMS_UpdatePolicyAgainstApiKey_03 | Validate that updating a Policy against an API Key fails when an invalid apiKey is provided | 00:00:01 |
| TC_PMS_UpdatePolicyAgainstApiKey_05 | Validate that updating a Policy against an API Key fails when an invalid newPolicyId is provided | 00:00:01 |
| TC_PMS_UpdatePolicyAgainstApiKey_02 | Validate that updating a Policy against an API Key fails when an invalid partnerId is provided | 00:00:01 |
| AuditLogPartnerApiKey_ — Passed | ||
| TC_PMS_addContact_01 | Validate that a contact is successfully added when all input parameters are valid | 00:00:01 |
| UpdatePolicyGroupForPartner — Passed | ||
| TC_PMS_UpdatePolicyGroupForPartner_01 | Validate that updating a Policy Group for a Partner with all valid inputs is successful and the changes are reflected correctly | 00:00:01 |
| TC_PMS_UpdatePolicyGroupForPartner_02 | Validate that updating a Policy Group for a Partner fails when an invalid Partner is provided | 00:00:01 |
| TC_PMS_UpdatePolicyGroupForPartner_04 | Validate that updating a Policy Group for a Partner fails when an invalid policyGroup is provided | 00:00:01 |
| TC_PMS_UpdatePolicyGroupForPartner_03 | Validate that updating a Policy Group for a Partner fails when an invalid partnerId is provided | 00:00:01 |
| AuditLogUpdatePolicyGroupForPartner — Passed | ||
| TC_PMS_addContact_01 | Validate that a contact is successfully added when all input parameters are valid | 00:00:01 |
| DBValidator — Passed | ||
| TC_PMS_DBValidator_03 | Validate that data created using API Key module is correctly stored and consistent in the database | 00:00:01 |
| TC_PMS_DBValidator_04 | Validate that data created using MISP module is correctly stored and consistent in the database | 00:00:01 |
| TC_PMS_DBValidator_01 | Validate that data created using PMS is correctly stored and consistent in the database | 00:00:01 |
| TC_PMS_DBValidator_02 | Validate that data created using Policy module is correctly stored and consistent in the database | 00:00:01 |
| RegenerateMISPPartnerLicense — Passed | ||
| TC_PMS_RegenerateMISPPartnerLicense_01 | Validate that a MISP partner license is successfully regenerated for a valid partner ID and all required parameters as part of a smoke test | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicense_05 | Validate that the API returns an error when attempting to regenerate a MISP partner license with an empty policy ID | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicense_02 | Validate that the API returns an error when attempting to regenerate a MISP partner license without providing a policy ID | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicense_04 | Validate that the MISP partner license is successfully regenerated when a valid license key name is provided | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicense_03 | Validate that the MISP partner license is successfully regenerated when a valid policy ID is provided | 00:00:01 |
| RegenerateMISPPartnerLicenseNegTC — Passed | ||
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_01 | Validate that the API returns an error when attempting to regenerate a MISP partner license using an invalid access token | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_11 | Validate that the API returns an error when attempting to regenerate a MISP partner license with an empty expiry date | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_06 | Validate that the API returns an error when attempting to regenerate a MISP partner license with an empty license key name | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_17 | Validate that the API returns an error when attempting to regenerate a MISP partner license with an empty request time | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_14 | Validate that the API returns an error when attempting to regenerate a MISP partner license with an empty request ID | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_09 | Validate that the API returns an error when attempting to regenerate a MISP partner license using a license key name that already exists | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_10 | Validate that the API returns an error when attempting to regenerate a MISP partner license with an expiry date earlier than the current date | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_03 | Validate that the API returns an error when attempting to regenerate a MISP partner license using a partner ID with an invalid format | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_02 | Validate that the API returns an error when attempting to regenerate a MISP partner license using an invalid partner ID | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_18 | Validate that the API returns an error when attempting to regenerate a MISP partner license using an invalid request time | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_15 | Validate that the API returns an error when attempting to regenerate a MISP partner license using an invalid request ID | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_16 | Validate that the API returns an error when attempting to regenerate a MISP partner license using an invalid version value | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_07 | Validate that the API returns an error when attempting to regenerate a MISP partner license using a license key name that exceeds the maximum allowed length | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_13 | Validate that the API returns an error when attempting to regenerate a MISP partner license with the expiry date field missing from the request | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_12 | Validate that the API returns an error when attempting to regenerate a MISP partner license with the license key name field missing from the request | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_19 | Validate that the API returns an error when attempting to regenerate a MISP partner license with the request time field missing from the request | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_04 | Validate that the API returns an error when attempting to regenerate a MISP partner license using a policy ID that has not been approved | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_08 | Validate that the API returns an error when attempting to regenerate a MISP partner license using a license key name containing special characters | 00:00:01 |
| TC_PMS_RegenerateMISPPartnerLicenseNegTC_05 | Validate that the API returns an error when attempting to regenerate a MISP partner license using a policy ID containing special characters | 00:00:01 |
| DeactivateMISPPartnerLicense — Passed | ||
| TC_PMS_DeactivateMISPPartnerLicense_01 | Validate that a MISP partner license is successfully deactivated when a valid request is submitted | 00:00:01 |
| DeactivateMISPPartnerLicenseNegTC — Passed | ||
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_06 | Validate that deactivating a MISP partner license fails when both the policy ID and license key name are left empty | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_07 | Validate that deactivating a MISP partner license fails when both the policy ID and status are left empty | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_05 | Validate that deactivating a MISP partner license fails when the policy ID is left empty | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_10 | Validate that deactivating a MISP partner license fails when an invalid license ID is provided | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_04 | Validate that deactivating a MISP partner license fails when an invalid policy ID is provided | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_03 | Validate that deactivating a MISP partner license fails when an invalid license status is provided | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_09 | Validate that deactivating a MISP partner license fails when an invalid authentication token is provided | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_02 | Validate that deactivating a MISP partner license fails when an invalid or incorrect version is provided | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_01 | Validate that deactivating a MISP partner license fails when no access token is provided | 00:00:01 |
| TC_PMS_DeactivateMISPPartnerLicenseNegTC_08 | Validate that deactivating a MISP partner license fails when the partner ID field is missing from the request | 00:00:01 |
| DeactivateDevice — Passed | ||
| TC_PMS_DeactivateDevice_01 | Validate that a device is successfully deactivated when all input parameters are valid | 00:00:01 |
| DeactivateDeviceNegativeScenarios — Passed | ||
| TC_PMS_DeactivateDevice_07 | Validate that device deactivation fails when the device is already deactivated | 00:00:01 |
| TC_PMS_DeactivateDevice_05 | Validate that device deactivation fails when the request time is empty | 00:00:01 |
| TC_PMS_DeactivateDevice_04 | Validate that device deactivation fails when the request time is missing | 00:00:01 |
| TC_PMS_DeactivateDevice_09 | Validate that device deactivation fails when the version value is empty | 00:00:01 |
| TC_PMS_DeactivateDevice_02 | Validate that device deactivation fails when an invalid device ID is provided | 00:00:01 |
| TC_PMS_DeactivateDevice_06 | Validate that device deactivation fails when a random or non-existent device ID is provided | 00:00:01 |
| TC_PMS_DeactivateDevice_08 | Validate that device deactivation fails when an invalid version is provided | 00:00:01 |
| TC_PMS_DeactivateDevice_03 | Validate that device deactivation fails when the request time is invalid | 00:00:01 |
| TC_PMS_DeactivateDevice_10 | Validate that device deactivation fails when authentication is not provided | 00:00:01 |
| DeactivateSBIWithAssociatedDevices — Passed | ||
| TC_PMS_DeactivateSBIWithAssociatedDevices_01 | Validate that SBI is successfully deactivated even when it has associated devices | 00:00:01 |
| DeactivateSBIWithAssociatedDevicesNegativeScenarios — Passed | ||
| TC_PMS_DeactivateSBIWithAssociatedDevices_15 | Validate that SBI deactivation fails when the SBI is already deactivated even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_07 | Validate that SBI deactivation fails when the SBI ID is empty even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_10 | Validate that SBI deactivation fails when the version is empty even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_03 | Validate that SBI deactivation fails when the request time is empty even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_18 | Validate that SBI deactivation fails when the SBI ID contains an invalid numeric value even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_04 | Validate that SBI deactivation fails when an invalid SBI ID is provided even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_19 | Validate that SBI deactivation fails when an invalid SBI ID is provided even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_12 | Validate that SBI deactivation fails when the version value is 0 even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_11 | Validate that SBI deactivation fails when an invalid version value is provided even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_13 | Validate that SBI deactivation fails when an invalid version value is provided even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_14 | Validate that SBI deactivation fails when an invalid request time is provided even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_06 | Validate that SBI deactivation fails when the SBI ID is provided as null even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_05 | Validate that SBI deactivation fails when the SBI ID is missing even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_08 | Validate that SBI deactivation fails when the version is missing even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_02 | Validate that SBI deactivation fails when the request time is missing even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_16 | Validate that SBI deactivation fails when the SBI ID is null, even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_09 | Validate that SBI deactivation fails when the version is null even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_17 | Validate that SBI deactivation fails when the SBI ID contains only spaces even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_01 | Validate that SBI deactivation fails when authentication is not provided even if it has associated devices | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_20 | Validate that SBI deactivation fails when attempted by a user with invalid roles even if the SBI has associated devices | 00:00:01 |
| ApproveMappingDeviceToSbiwhenSBIisDeactivated — Passed | ||
| TC_PMS_ApproveMappingDevice_15 | Validate that device mapping to an SBI fails when the SBI is deactivated | 00:00:01 |
| DeactivateFtm — Passed | ||
| TC_PMS_DeactivateFtm_01 | Validate that an FTM device is successfully deactivated when all input parameters are valid | 00:00:01 |
| DeactivateFtmNegativeScenarios — Passed | ||
| TC_PMS_DeactivateFtmNegativeScenarios_14 | Deactivating the FTM which is already Deactivated and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_16 | Deactivate the FTM while keeping FTM ID parameter as Empty and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_04 | Deactivate FTM keeping ID parameter as Empty in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_07 | Deactivate FTM while keeping Version parameter as Empty in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_12 | Deactivate FTM while keeping requestTime parameter as Empty in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_17 | Deactivate the FTM while keeping FTM ID parameter as Invalid values and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_09 | Deactivate FTM while keeping Version parameter as invalid value 0 in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_08 | Deactivate FTM while keeping Version parameter as invalid value 1 in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_10 | Deactivate FTM while keeping Version parameter as invalid values in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_13 | Deactivate FTM while keeping Request Time parameter as invalid in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_03 | Deactivate FTM while keeping requestID parameter as Null in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_02 | Deactivate FTM with the requestID parameter missing in the request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_05 | Deactivate FTM while keeping Version parameter as Missing in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_11 | Deactivate FTM while keeping requestTime parameter as Missing in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_18 | Deactivate the FTM while keeping FTM ID parameter as Null and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_06 | Deactivate FTM while keeping Version parameter as Null in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_15 | Deactivate the FTM while keeping FTM ID parameter as Missing and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_01 | Validate that FTM device deactivation fails when authentication is not provided | 00:00:01 |
| GetOriginalFtmCertifacteAfterDeactiveFtm — Passed | ||
| TC_PMS_GetOriginalFtmCertifacteAfterDeactiveFtm_01 | Verify that the API fails to retrieve FTM certificates after the FTM has been deactivated | 00:00:01 |
| DeactivatePolicy — Passed | ||
| TC_PMS_deactivate_policy_01 | Validate that a published policy is successfully deactivated with all valid inputs | 00:00:01 |
| TC_PMS_deactivate_policy_11 | Validate that policy deactivation fails when the policy is in rejected status | 00:00:01 |
| TC_PMS_deactivate_policy_06 | Validate that policy deactivation fails when the policy is already deactivated | 00:00:01 |
| TC_PMS_deactivate_policy_04 | Validate that policy deactivation fails when an invalid policy ID is provided | 00:00:01 |
| TC_PMS_deactivate_policy_05 | Validate that policy deactivation fails when the policy ID contains spaces | 00:00:01 |
| TC_PMS_deactivate_policy_03 | Validate that policy deactivation fails when attempted by a user with invalid roles | 00:00:01 |
| TC_PMS_deactivate_policy_12 | Validate that policy deactivation fails when the policy is in draft status | 00:00:01 |
| TC_PMS_deactivate_policy_13 | Validate that policy deactivation fails when the policy is in progress | 00:00:01 |
| TC_PMS_deactivate_policy_10 | Validate that policy deactivation fails when there are approved policy requests associated with it | 00:00:01 |
| TC_PMS_deactivate_policy_02 | Validate that policy deactivation fails when authentication is not provided | 00:00:01 |
| TC_PMS_deactivate_policy_07 | Validate that policy deactivation fails when the policy ID is not provided | 00:00:01 |
| TC_PMS_deactivate_policy_09 | Validate that policy deactivation fails when the request time is not provided | 00:00:01 |
| TC_PMS_deactivate_policy_08 | Validate that policy deactivation fails when the policy version is not provided | 00:00:01 |
| DeactivatePolicyGroup — Passed | ||
| TC_PMS_deactivate_policy_group_01 | Validate that a policy group is successfully deactivated when all inputs are valid | 00:00:01 |
| TC_PMS_deactivate_policy_group_12 | Validate that policy group deactivation fails when a future date is provided in the request | 00:00:01 |
| TC_PMS_deactivate_policy_group_05 | Validate that policy group deactivation fails when an invalid policy group ID is provided | 00:00:01 |
| TC_PMS_deactivate_policy_group_11 | Validate that policy group deactivation fails when an invalid policy group ID is provided | 00:00:01 |
| TC_PMS_deactivate_policy_group_03 | Validate that policy group deactivation fails when attempted by a user with invalid roles | 00:00:01 |
| TC_PMS_deactivate_policy_group_09 | Validate that policy group deactivation fails when an invalid status is provided | 00:00:01 |
| TC_PMS_deactivate_policy_group_07 | Validate that policy group deactivation fails when an invalid version is provided | 00:00:01 |
| TC_PMS_deactivate_policy_group_13 | Validate that policy group deactivation fails when a past date is provided in the request | 00:00:01 |
| TC_PMS_deactivate_policy_group_10 | Validate that policy group deactivation fails when the policy group ID contains only spaces | 00:00:01 |
| TC_PMS_deactivate_policy_group_17 | Validate that policy group deactivation fails when it contains draft policies | 00:00:01 |
| TC_PMS_deactivate_policy_group_15 | Validate that policy group deactivation succeeds even when it contains already deactivated policies | 00:00:01 |
| TC_PMS_deactivate_policy_group_16 | Validate that policy group deactivation fails when it contains published policies | 00:00:01 |
| TC_PMS_deactivate_policy_group_02 | Validate that policy group deactivation fails when authentication is not provided | 00:00:01 |
| TC_PMS_deactivate_policy_group_04 | Validate that policy group deactivation fails when the policy group ID is not provided | 00:00:01 |
| TC_PMS_deactivate_policy_group_14 | Validate that policy group deactivation fails when the request time is not provided | 00:00:01 |
| TC_PMS_deactivate_policy_group_08 | Validate that policy group deactivation fails when the status is not provided | 00:00:01 |
| TC_PMS_deactivate_policy_group_06 | Validate that policy group deactivation fails when the version is not provided | 00:00:01 |
| GetAllNotifications — Passed | ||
| TC_PMS_GetAllNotifications_13 | Validate that retrieving notifications using a partner token fails when filtered by a notificationTypeRoot that the partner is not authorized to access | 00:00:01 |
| TC_PMS_GetAllNotifications_14 | Validate that retrieving notifications fails when filtering by certificateID is attempted without selecting a notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_01 | Validate that all notifications are successfully retrieved with valid inputs | 00:00:01 |
| TC_PMS_GetAllNotifications_06 | Validate that retrieving notifications fails when the createdFromDate is provided in an unsupported or incorrect date/time format | 00:00:01 |
| TC_PMS_GetAllNotifications_08 | Validate that retrieving notifications fails when the createdToDate is provided in an unsupported or incorrect date/time format | 00:00:01 |
| TC_PMS_GetAllNotifications_10 | Validate that retrieving notifications fails when the expiryDate is provided in an unsupported or incorrect date/time format | 00:00:01 |
| TC_PMS_GetAllNotifications_38 | Validate that notifications retrieval fails when an invalid ftmChipType is provided while filtering by apiKey | 00:00:01 |
| TC_PMS_GetAllNotifications_41 | Validate that notifications retrieval fails when an invalid notificationType or partnerDomain is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_35 | Validate that notifications retrieval fails when an invalid page number is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_02 | Validate that retrieving notifications fails when an invalid page size 4 is provided in the filter | 00:00:01 |
| TC_PMS_GetAllNotifications_03 | Validate that retrieving notifications fails when an invalid page size 8 is provided in the filter | 00:00:01 |
| Pms_GetAllNotifications_Filter_Root_Certificates_Notifications | Validate that the Get All Notifications API correctly retrieves notifications related to root certificates when filtered by the appropriate notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_32 | Validate that notifications retrieval fails when filtering by sbiId without selecting a notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_19 | Validate that the Get All Notifications API correctly retrieves notifications that are currently active when filtered by status active | 00:00:01 |
| TC_PMS_GetAllNotifications_20 | Validate that the Get All Notifications API correctly retrieves notifications that are dismissed when filtered by status dismissed | 00:00:01 |
| TC_PMS_GetAllNotifications_17 | Validate that the Get All Notifications API correctly retrieves notifications filtered for the current week returning only notifications issued within the last 7 days | 00:00:01 |
| TC_PMS_GetAllNotifications_39 | Validate that notifications retrieval fails when an invalid apiKeyType is provided while filtering by ftmChip | 00:00:01 |
| TC_PMS_GetAllNotifications_30 | Validate that notifications retrieval fails when filtering by ftmChip without selecting a notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_36 | Validate that notifications retrieval fails when an invalid or non-numeric page number is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_37 | Validate that notifications retrieval fails when an invalid or non-numeric page size is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_31 | Validate that notifications retrieval fails when an invalid sbiId is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_34 | Validate that notifications retrieval fails when invalid sbiVersion values are provided | 00:00:01 |
| TC_PMS_GetAllNotifications_33 | Validate that notifications retrieval fails when an invalid sbiVersion is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_28 | Validate that notifications retrieval fails when an invalid ftmId is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_29 | Validate that notifications retrieval fails when an invalid make or model is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_27 | Validate that notifications retrieval fails when an invalid policyName is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_26 | Validate that notifications retrieval fails when policyName is filtered with an invalid notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_25 | Validate that notifications retrieval fails when policyName is filtered without notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_40 | Validate that notifications retrieval fails when an invalid ftmChip is provided while filtering by sbiId | 00:00:01 |
| TC_PMS_GetAllNotifications_22 | Validate that retrieving notifications fails when requesting notifications for IntermediateType without proper filters or permissions | 00:00:01 |
| TC_PMS_GetAllNotifications_21 | Validate that retrieving notifications fails when requesting notifications for RootType without proper filters | 00:00:01 |
| TC_PMS_GetAllNotifications_23 | Validate that retrieving notifications fails when requesting notifications for WeeklyType without proper filters | 00:00:01 |
| TC_PMS_GetAllNotifications_49 | Validate that notifications retrieval fails when an invalid certificateID is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_04 | Validate that retrieving notifications fails when an invalid certificate ID is provided without specifying the notification type | 00:00:01 |
| TC_PMS_GetAllNotifications_05 | Validate that retrieving notifications fails when an invalid created-from date is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_07 | Validate that retrieving notifications fails when an invalid createdToDate value is provided in the request | 00:00:01 |
| TC_PMS_GetAllNotifications_09 | Validate that retrieving notifications fails when an invalid expiryDate value is provided in the request | 00:00:01 |
| TC_PMS_GetAllNotifications_11 | Validate that retrieving notifications fails when filtering by issuedBy is attempted without selecting a notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_12 | Validate that retrieving notifications fails when filtering by issuedTo is attempted without selecting a notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_24 | Validate that retrieving notifications fails when an invalid apiKeyName is provided in the request | 00:00:01 |
| TC_PMS_GetAllNotifications_48 | Validate that notifications retrieval fails when an unsupported API Key notification type is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_50 | Validate that notifications retrieval fails when filtering by API Key notification type along with an invalid certificateID | 00:00:01 |
| TC_PMS_GetAllNotifications_53 | Validate that notifications retrieval fails when filtering by API Key notification type with an invalid licenseKeyName | 00:00:01 |
| TC_PMS_GetAllNotifications_54 | Validate that notifications retrieval fails when filtering by API Key notification type with an invalid apiKeyName | 00:00:01 |
| TC_PMS_GetAllNotifications_47 | Validate that notifications retrieval fails when an unsupported FTM-Chip notification type is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_42 | Validate that notifications retrieval fails when an invalid access token is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_43 | Validate that notifications retrieval fails when invalid query parameters are provided | 00:00:01 |
| TC_PMS_GetAllNotifications_44 | Validate that notifications retrieval fails when an unsupported MISP notification type is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_51 | Validate that notifications retrieval fails when filtering with no notificationType and an invalid certificateID | 00:00:01 |
| TC_PMS_GetAllNotifications_45 | Validate that notifications retrieval fails when an unsupported Partner notification type is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_52 | Validate that notifications retrieval fails when filtering by Partner notification type with an invalid MISP Partner ID | 00:00:01 |
| TC_PMS_GetAllNotifications_56 | Validate that notifications retrieval fails when filtering by Partner notification type with an invalid apiKeyName | 00:00:01 |
| TC_PMS_GetAllNotifications_59 | Validate that notifications retrieval fails when filtering by Partner notification type with an invalid createdToDate | 00:00:01 |
| TC_PMS_GetAllNotifications_55 | Validate that notifications retrieval fails when filtering by Root notification type with an invalid apiKeyName | 00:00:01 |
| TC_PMS_GetAllNotifications_46 | Validate that notifications retrieval fails when an unsupported SBI notification type is provided | 00:00:01 |
| TC_PMS_GetAllNotifications_57 | Validate that notifications retrieval fails when filtering by SBI notification type with an invalid expiryDate | 00:00:01 |
| TC_PMS_GetAllNotifications_58 | Validate that notifications retrieval fails when filtering by Weekly notification type with invalid createdFromDate or createdToDate | 00:00:01 |
| TC_PMS_GetAllNotifications_15 | Validate that retrieving notifications fails when the request is made without providing a valid authorization token | 00:00:01 |
| TC_PMS_GetAllNotifications_16 | Validate that retrieving notifications fails when the request is made by a user who does not have the Partner Admin role | 00:00:01 |
| DismissNotificationNegativeScenarios — Passed | ||
| TC_PMS_DismissNotificationNegativeScenarios_18 | Validate that dismissing a notification fails when the notification status is empty | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_07 | Validate that dismissing a notification fails when the request ID is empty | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_14 | Validate that dismissing a notification fails when the requestTime is empty | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_02 | Validate that dismissing a notification fails when an invalid notification ID is provided | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_17 | Validate that dismissing a notification fails when the notification status is invalid | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_19 | Validate that dismissing a notification fails when an invalid parameter is provided for dismissNotificationStatus | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_04 | Validate that dismissing a notification fails when an invalid request ID is provided | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_12 | Validate that dismissing a notification fails when the version value is invalid set to 0 | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_11 | Validate that dismissing a notification fails when the version value is invalid set to 1 | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_10 | Validate that dismissing a notification fails when an invalid version is provided | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_03 | Validate that dismissing a notification fails when the notification ID is null | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_06 | Validate that dismissing a notification fails when the request ID is null | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_09 | Validate that dismissing a notification fails when the version is null | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_01 | Validate that dismissing a notification fails when authentication is not provided | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_05 | Validate that dismissing a notification fails when the request ID is not provided | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_08 | Validate that dismissing a notification fails when the version is not provided | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_16 | Validate that dismissing a notification fails when the object parameter is not provided | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_15 | Validate that dismissing a notification fails when the user does not have the Partner Admin role | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_13 | Validate that dismissing a notification fails when the requestTime is not provided | 00:00:01 |
| UpdateNotificationSeenTimestamp — Passed | ||
| TC_PMS_UpdateNotificationSeenTimestamp_01 | Validate that updating the Notification Seen Timestamp with all valid inputs is successful and the changes are reflected correctly | 00:00:01 |
| UpdateNotificationSeenTimestampNegativeScenarios — Passed | ||
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_07 | Validate that updating the Notification Seen Timestamp fails when the requestId parameter is empty | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_14 | Validate that updating the Notification Seen Timestamp fails when the requestTime parameter is empty | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_16 | Validate that updating the Notification Seen Timestamp fails when notificationsSeenDtimes is empty | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_17 | Validate that updating the Notification Seen Timestamp fails when performed by a user with an invalid Partner Admin role | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_04 | Validate that updating the Notification Seen Timestamp fails when an invalid requestId is provided | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_10 | Validate that updating the Notification Seen Timestamp fails when an invalid version parameter value is provided | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_02 | Validate that updating the Notification Seen Timestamp fails when an invalid userId is provided | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_19 | Validate that updating the Notification Seen Timestamp fails when an invalid userId is provided even with Partner Admin role | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_06 | Validate that updating the Notification Seen Timestamp fails when the requestId parameter is null | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_09 | Validate that updating the Notification Seen Timestamp fails when the version parameter value is null | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_03 | Validate that updating the Notification Seen Timestamp fails when the userId is null | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_12 | Validate that updating the Notification Seen Timestamp fails when version is set to an invalid value 0 | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_11 | Validate that updating the Notification Seen Timestamp fails when version is set to an unsupported value -1 | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_01 | Validate that updating the Notification Seen Timestamp fails when authentication is not provided | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_08 | Validate that updating the Notification Seen Timestamp fails when the version parameter value is missing | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_18 | Validate that updating the Notification Seen Timestamp fails when performed by a user with Partner role | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_15 | Validate that updating the Notification Seen Timestamp fails when the request object is missing | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_05 | Validate that updating the Notification Seen Timestamp fails when the requestId parameter is missing | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_13 | Validate that updating the Notification Seen Timestamp fails when the requestTime parameter is missing | 00:00:01 |
| GetNotificationsSeenTimestamp — Passed | ||
| TC_PMS_GetNotificationsSeenTimestamp_01 | Validate that the API successfully retrieves the seen timestamps for all notifications with valid inputs | 00:00:01 |
| GetNotificationsSeenTimestampNegativeScenarios — Passed | ||
| TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_01 | Validate that the API fails to retrieve notification timestamps when an invalid userId is provided | 00:00:01 |
| TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_04 | Validate that the API fails to retrieve notification timestamps when an invalid userId is provided even with a Partner Admin role | 00:00:01 |
| TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_03 | Validate that the API fails to retrieve notification timestamps when an invalid or expired token is used | 00:00:01 |
| TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_02 | Validate that the API fails to retrieve notification timestamps when accessed without an admin role | 00:00:01 |
| GetPartnerExpiringCertificate — Passed | ||
| TC_PMS_GetPartnerExpiringCertificate_01 | Validate that all partner certificates nearing expiry are retrieved successfully for a valid request | 00:00:01 |
| TC_PMS_GetPartnerExpiringCertificate_04 | Validate that partner certificates expiring exactly 10 days from today are retrieved successfully | 00:00:01 |
| TC_PMS_GetPartnerExpiringCertificate_03 | Validate that partner certificates expiring exactly 15 days from today are retrieved successfully | 00:00:01 |
| TC_PMS_GetPartnerExpiringCertificate_02 | Validate that partner certificates expiring within the next 30 days are retrieved successfully | 00:00:01 |
| GetPartnerExpiringCertificateNegativeScenarios — Passed | ||
| TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_02 | Validate that retrieving expiring partner certificates fails when the user has an invalid role | 00:00:01 |
| TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_01 | Validate that retrieving expiring partner certificates fails when an invalid token is used | 00:00:01 |
| GetRootIntermediateExpiringCertificate — Passed | ||
| TC_PMS_GetRootIntermediateExpiringCertificate_01 | Validate that all root and intermediate certificates nearing expiry are retrieved successfully for a valid request | 00:00:01 |
| TC_PMS_GetRootIntermediateExpiringCertificate_04 | Validate that root and intermediate certificates expiring exactly 10 days from today are retrieved successfully | 00:00:01 |
| TC_PMS_GetRootIntermediateExpiringCertificate_03 | Validate that root and intermediate certificates expiring exactly 15 days from today are retrieved successfully | 00:00:01 |
| TC_PMS_GetRootIntermediateExpiringCertificate_02 | Validate that root and intermediate certificates expiring within the next 30 days are retrieved successfully | 00:00:01 |
| GetRootIntermediateExpiringCertificateNegativeScenarios — Passed | ||
| TC_PMS_GetRootIntermediateExpiringCertificateNegativeScenarios_01 | Validate that retrieving partner expiring certificates fails when an invalid token is used | 00:00:01 |
| TC_PMS_GetRootIntermediateExpiringCertificateNegativeScenarios_02 | Validate that retrieving root and intermediate expiring certificates fails when the user has an invalid or unauthorized partner role | 00:00:01 |
| GetAllApiKeyForAuthPartnerV2 — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerV2_01 | Validate that all API keys are successfully retrieved for an authenticated partner using the V2 API with valid inputs | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_02 | Validate that all API keys are successfully retrieved for an authenticated partner using a partner token | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_05 | Validate that API keys are successfully retrieved for an authenticated partner when filtered by page number | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_16 | Validate that API keys are successfully retrieved for an authenticated partner when filtered for keys expiring within the next 10 days | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_15 | Validate that API keys are successfully retrieved for an authenticated partner when filtered for keys expiring within the next 15 days | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_14 | Validate that API keys are successfully retrieved for an authenticated partner when filtered for keys expiring within the next 30 days | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_12 | Validate that API keys are successfully retrieved for an authenticated partner when filtered by status Activated | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_13 | Validate that API keys are successfully retrieved for an authenticated partner when filtered by status Deactivated | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_03 | Validate that API keys are successfully retrieved for an authenticated partner when filtered by API key label | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_04 | Validate that API keys are successfully retrieved for an authenticated partner when filtered by organization name | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_06 | Validate that API keys are successfully retrieved for an authenticated partner when filtered by page size | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_07 | Validate that API keys are successfully retrieved for an authenticated partner when filtered by partner ID | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_08 | Validate that API keys are successfully retrieved for an authenticated partner when filtered by policy group name | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_09 | Validate that API keys are successfully retrieved for an authenticated partner when filtered by policy name | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_10 | Validate that API keys are successfully retrieved for an authenticated partner and sorted in ascending order based on the specified field | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_11 | Validate that API keys are successfully retrieved for an authenticated partner and sorted in descending order based on the specified field | 00:00:01 |
| GetAllApiKeyForAuthPartnerV2NegativeScenarios — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_02 | Validate that retrieving API keys fails when a device partner token is used instead of a valid partner token | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_03 | Validate that retrieving API keys fails when an FTM partner token is used instead of a valid partner token | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_14 | Validate that retrieving API keys fails when the page number is not provided | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_13 | Validate that retrieving API keys fails when the user has an invalid role | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_04 | Validate that retrieving API keys fails when an invalid API key label is provided | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_05 | Validate that retrieving API keys fails when an invalid organization name is provided | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_06 | Validate that retrieving API keys fails when an invalid page number is provided | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_07 | Validate that retrieving API keys fails when an invalid page size is provided | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_08 | Validate that retrieving API keys fails when an invalid partner ID is provided | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_09 | Validate that retrieving API keys fails when an invalid policy group name is provided | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_10 | Validate that retrieving API keys fails when an invalid policy name is provided | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_12 | Validate that retrieving API keys fails when the sort field name is set to an invalid value 1 | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_11 | Validate that retrieving API keys fails when an invalid sort field name is provided | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_01 | Validate that retrieving API keys for a partner fails when authentication is not provided | 00:00:01 |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_Active_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_Active_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip policy group2", "name": "$RUNCONTEXT$mosip policy group2", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$mosip policy group2", "desc": "$RUNCONTEXT$desc mosip policy group2", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group is successfully created when it is active, uniqueIdentifier=TC_PMS_definePolicyGroup_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_All_Valid_ForDraftPolicy_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_All_Valid_ForDraftPolicy_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip draft policy group19234", "name": "$RUNCONTEXT$mosip draft policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$mosip draft policy group 19234", "desc": "$RUNCONTEXT$desc mosip draft policy group19234", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group is successfully created when PMS has a draft policy, uniqueIdentifier=TC_PMS_definePolicyGroup_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc published mosip policy group19234", "name": "$RUNCONTEXT$mosip published policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$mosip published policy group 19234", "desc": "$RUNCONTEXT$desc published mosip policy group19234", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group is successfully created when PMS has a published policy, uniqueIdentifier=TC_PMS_definePolicyGroup_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip delete before policy creation policy group19234", "name": "$RUNCONTEXT$mosip delete before policy creation policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$mosip delete before policy creation policy group 19234", "desc": "$RUNCONTEXT$desc mosip delete before policy creation policy group19234", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group is successfully created after deleting any existing groups before policy creation, uniqueIdentifier=TC_PMS_definePolicyGroup_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_All_Valid_Smoke_ForDeactivatePolicy_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_ForDeactivatePolicy_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc deactivate mosip policy group19234", "name": "$RUNCONTEXT$mosip deactivate policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$mosip deactivate policy group 19234", "desc": "$RUNCONTEXT$desc deactivate mosip policy group19234", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group is successfully created for deactivating a policy in PMS, uniqueIdentifier=TC_PMS_definePolicyGroup_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_All_Valid_Smoke_For_Test_AuthTypeToken_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_For_Test_AuthTypeToken_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip policy group AuthTypeToken", "name": "$RUNCONTEXT$mosip policy group for AuthTypeToken", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$mosip policy group for AuthTypeToken", "desc": "$RUNCONTEXT$desc mosip policy group AuthTypeToken", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group is successfully created using AuthTypeToken, uniqueIdentifier=TC_PMS_definePolicyGroup_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_All_Valid_Smoke_For_updatePolicy_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_For_updatePolicy_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip policy group for req key For Update", "name": "$RUNCONTEXT$mosip policy group for req key For Update", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$mosip policy group for req key For Update", "desc": "$RUNCONTEXT$desc mosip policy group for req key For Update", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group is successfully created or updated for policy updates in PMS, uniqueIdentifier=TC_PMS_definePolicyGroup_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_All_Valid_Smoke_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip policy group19234", "name": "$RUNCONTEXT$mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$mosip policy group 19234", "desc": "$RUNCONTEXT$desc mosip policy group19234", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group is successfully created with all valid inputs, uniqueIdentifier=TC_PMS_definePolicyGroup_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_AlreadyExists_InValid_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_AlreadyExists_InValid_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip policy group19234", "name": "$RUNCONTEXT$mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_014", "message": "Policy group exists with name : $RUNCONTEXT$mosip policy group 19234" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group creation fails when the policy group already exists, uniqueIdentifier=TC_PMS_definePolicyGroup_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip policy neg", "name": "$RUNCONTEXT$mosip policy group neg", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$mosip policy group neg", "desc": "$RUNCONTEXT$desc mosip policy neg", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group is successfully created with valid inputs for negative test scenarios, uniqueIdentifier=TC_PMS_definePolicyGroup_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$mosip policy group MISP", "name": "$RUNCONTEXT$mosip policy group MISP", "requesttime": "$TIMESTAMP$" }, output= { "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP policy group is successfully created with all valid inputs, uniqueIdentifier=TC_PMS_definePolicyGroup_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_Missing_InputParameter_desc_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_Missing_InputParameter_desc_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$REMOVE$", "name": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.desc" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group creation fails when the description input parameter is missing, uniqueIdentifier=TC_PMS_definePolicyGroup_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_Missing_InputParameter_name_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_Missing_InputParameter_name_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group", "name": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.name" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group creation fails when the name input parameter is missing, uniqueIdentifier=TC_PMS_definePolicyGroup_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_Missing_InputParameter_requesttime_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_Missing_InputParameter_requesttime_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group 1233", "name": "mosip policy group 1233", "requesttime": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004", "message": "Invalid request time" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group creation fails when the requestTime input parameter is missing, uniqueIdentifier=TC_PMS_definePolicyGroup_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_PastDate_Request_Time_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_PastDate_Request_Time_Neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group192345", "name": "mosip policy group 192345", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006", "message": "Request date should be current date" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group creation fails when the request time is set to a past date, uniqueIdentifier=TC_PMS_definePolicyGroup_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_UpdatePolicyGroupForPartner_All_Valid_Smoke_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_UpdatePolicyGroupForPartner_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc update policy group", "name": "$RUNCONTEXT$update_policy_group", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$update_policy_group", "desc": "$RUNCONTEXT$desc update policy group", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group is successfully updated for a partner with all valid inputs, uniqueIdentifier=TC_PMS_definePolicyGroup_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_Without_Auth_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_Without_Auth_neg, endPoint=/v1/policymanager/policies/group/new, role=temp, templateFields=null, input={ "desc": "desc mosip policy group192345", "name": "mosip policy group 192345", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "KER-ATH-403", "message": "Forbidden" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group creation fails when authentication is not provided, uniqueIdentifier=TC_PMS_definePolicyGroup_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip policy group1923456789", "name": "$RUNCONTEXT$mosip policy group1923456789", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$mosip policy group1923456789", "desc": "$RUNCONTEXT$desc mosip policy group1923456789", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group is successfully created when PMS is deactivated, uniqueIdentifier=TC_PMS_definePolicyGroup_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_create_then_deactivateAll_Valid_Smoke_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_create_then_deactivateAll_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip policy group1923456", "name": "$RUNCONTEXT$mosip policy group1923456", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$mosip policy group1923456", "desc": "$RUNCONTEXT$desc mosip policy group1923456", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group is successfully created and then deactivated in PMS, uniqueIdentifier=TC_PMS_definePolicyGroup_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicyGroup_for_Get_ApiKey_With_Deactive_Partner_All_Valid_Smoke_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicyGroup_for_Get_ApiKey_With_Deactive_Partner_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$mosip policy group for req key For_Req_Key_deactivaed_Policy", "name": "$RUNCONTEXT$mosip policy group for req key For_Req_Key_deactivaed_Policy", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$mosip policy group for req key For_Req_Key_deactivaed_Policy", "desc": "$RUNCONTEXT$mosip policy group for req key For_Req_Key_deactivaed_Policy", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group is successfully created when retrieving API keys for a deactivated partner, uniqueIdentifier=TC_PMS_definePolicyGroup_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPolicyGroup_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPolicyGroup_All_Valid_Smoke, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$" }, output={ "desc": "$RUNCONTEXT$desc mosip policy group19234", "isActive": true, "name": "$RUNCONTEXT$mosip policy group 19234" }, inputTemplate=pms/policy/GetPolicyGroup/getPolicyGroup, outputTemplate=pms/policy/GetPolicyGroup/getPolicyGroupResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all policy groups can be retrieved successfully for valid inputs, uniqueIdentifier=TC_PMS_getPolicyGroup_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPolicyGroup_By_Invalid_policyGroupId |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPolicyGroup_By_Invalid_policyGroupId, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "policyGroupId": "policygroup-id-00001" }, output={ "errors": [ { "errorCode": "PMS_POL_016" } ] }, inputTemplate=pms/policy/GetPolicyGroup/getPolicyGroup, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving a policy group fails when an invalid policyGroupId is provided, uniqueIdentifier=TC_PMS_getPolicyGroup_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyGroup_All_Valid |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBodyForAutoGenId |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyGroup_All_Valid, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": false, "desc": "$RUNCONTEXT$desc mosip policy group20", "name": "$RUNCONTEXT$mosip policy group20", "policyGroupId": "$ID:DefinePolicyGroup_Active_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$mosip policy group20", "desc": "$RUNCONTEXT$desc mosip policy group20", "is_Active": false }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroupResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group can be updated successfully with valid inputs, uniqueIdentifier=TC_PMS_updatePolicyGroup_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyGroup_Invalid_InputParameter_policyGroupId |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBodyForAutoGenId |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyGroup_Invalid_InputParameter_policyGroupId, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": true, "desc": "desc mosip policy group", "name": "mosip policy group", "policyGroupId": "1234abcxyz", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_008", "message": "Policy ID does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a policy group fails when an invalid policy group ID is provided, uniqueIdentifier=TC_PMS_updatePolicyGroup_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyGroup_Missing_InputParameter_desc |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBodyForAutoGenId |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyGroup_Missing_InputParameter_desc, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": true, "desc": "$REMOVE$", "name": "mosip policy group neg4", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.desc" } ] }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a policy group fails when the policy group description is missing, uniqueIdentifier=TC_PMS_updatePolicyGroup_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyGroup_Missing_InputParameter_isActive |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBodyForAutoGenId |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyGroup_Missing_InputParameter_isActive, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": "$REMOVE$", "desc": "desc mosip policy group neg4", "name": "mosip policy group neg4", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_003", "message": "Could not process the request" } ] }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a policy group fails when the active status is missing, uniqueIdentifier=TC_PMS_updatePolicyGroup_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyGroup_Missing_InputParameter_name |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBodyForAutoGenId |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyGroup_Missing_InputParameter_name, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": true, "desc": "desc mosip policy group", "name": "$REMOVE$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.name" } ] }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a policy group fails when the policy group name is missing, uniqueIdentifier=TC_PMS_updatePolicyGroup_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyGroup_activate_All_Valid_Smoke_Sid |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBodyForAutoGenId |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyGroup_activate_All_Valid_Smoke_Sid, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": true, "desc": "$RUNCONTEXT$desc mosip policy group updated", "name": "$RUNCONTEXT$mosip policy group", "policyGroupId": "$ID:DefinePolicyGroup_Active_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$mosip policy group", "desc": "$RUNCONTEXT$desc mosip policy group updated", "is_Active": true }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroupResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group can be activated successfully with valid inputs, uniqueIdentifier=TC_PMS_updatePolicyGroup_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyGroup_deactivate_All_Valid |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBodyForAutoGenId |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyGroup_deactivate_All_Valid, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": false, "desc": "$RUNCONTEXT$desc mosip policy group deactivate", "name": "$RUNCONTEXT$mosip policy group deactivate", "policyGroupId": "$ID:DefinePolicyGroup_Active_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output= { "name": "$RUNCONTEXT$mosip policy group deactivate", "desc": "$RUNCONTEXT$desc mosip policy group deactivate", "is_Active": false }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroupResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group can be deactivated successfully with valid inputs, uniqueIdentifier=TC_PMS_updatePolicyGroup_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroupBeforePolicyCreation_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroupBeforePolicyCreation_All_Valid_Smoke, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_id$" }, output= { "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_id$", "isActive": false }, inputTemplate=pms/DeactivatePolicyGroupBeforePolicyCreation/deactivatePolicyGroup, outputTemplate=pms/DeactivatePolicyGroupBeforePolicyCreation/deactivatePolicyGroupResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group can be successfully deactivated before any policies are created within it, uniqueIdentifier=TC_PMS_DeactivatePolicyGroupBeforePolicyCreation_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_All_Valid_For_Draft_Policy_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_All_Valid_For_Draft_Policy_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc draft mosip policy 19234", "name": "$RUNCONTEXT$mosip draft policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_ForDraftPolicy_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_ForDraftPolicy_pms_sid_name$", "name": "$RUNCONTEXT$mosip draft policy 19234", "desc": "$RUNCONTEXT$desc draft mosip policy 19234", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy is successfully created when the PMS is in draft state, uniqueIdentifier=TC_PMS_definePolicy_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_All_Valid_For_InProgressMapping_Policy_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_All_Valid_For_InProgressMapping_Policy_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc in progress mapping mosip policy 19234", "name": "$RUNCONTEXT$mosip in progress mapping policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "name": "$RUNCONTEXT$mosip in progress mapping policy 19234", "desc": "$RUNCONTEXT$desc in progress mapping mosip policy 19234", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy is successfully created when the PMS has a policy in In-Progress mapping state, uniqueIdentifier=TC_PMS_definePolicy_31, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_All_Valid_For_Published_Policy_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_All_Valid_For_Published_Policy_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc published mosip policy 19234", "name": "$RUNCONTEXT$mosip published policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid_name$", "name": "$RUNCONTEXT$mosip published policy 19234", "desc": "$RUNCONTEXT$desc published mosip policy 19234", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy is successfully created when the PMS is in a published state, uniqueIdentifier=TC_PMS_definePolicy_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_All_Valid_For_Reject_Policy_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_All_Valid_For_Reject_Policy_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc reject mosip policy 19234", "name": "$RUNCONTEXT$mosip reject policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "name": "$RUNCONTEXT$mosip reject policy 19234", "desc": "$RUNCONTEXT$desc reject mosip policy 19234", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy is successfully created when the PMS has a rejected policy, uniqueIdentifier=TC_PMS_definePolicy_30, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Blank_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Blank_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "", "policyGroupName": "$ID:DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when the AuthTypeToken is left blank, uniqueIdentifier=TC_PMS_definePolicy_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Invalid_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Invalid_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "kjh54", "policyGroupName": "$ID:DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when an invalid AuthTypeToken is provided, uniqueIdentifier=TC_PMS_definePolicy_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Null_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Null_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "null", "policyGroupName": "$ID:DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when the AuthTypeToken value is null, uniqueIdentifier=TC_PMS_definePolicy_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Policy_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Policy_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "Policy", "policyGroupName": "$ID:DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy is successfully created with AuthTypeToken configured, uniqueIdentifier=TC_PMS_definePolicy_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Space_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Space_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": " ", "policyGroupName": "$ID:DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when the AuthTypeToken contains only spaces, uniqueIdentifier=TC_PMS_definePolicy_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc deactive mosip policy 19234", "name": "$RUNCONTEXT$mosip deactive policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_ForDeactivatePolicy_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_ForDeactivatePolicy_pms_sid_name$", "name": "$RUNCONTEXT$mosip deactive policy 19234", "desc": "$RUNCONTEXT$desc deactive mosip policy 19234", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy is successfully created when the PMS is deactivated, uniqueIdentifier=TC_PMS_definePolicy_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip policy", "name": "$RUNCONTEXT$mosip policy", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "name": "$RUNCONTEXT$mosip policy", "desc": "$RUNCONTEXT$desc mosip policy", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/policy/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy is successfully created and can be used to get an API key even when associated SBIs are deactivated, uniqueIdentifier=TC_PMS_definePolicy_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_All_Valid_Smoke_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip policy 19234", "name": "$RUNCONTEXT$mosip policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "name": "$RUNCONTEXT$mosip policy 19234", "desc": "$RUNCONTEXT$desc mosip policy 19234", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy is successfully created when all inputs are valid, uniqueIdentifier=TC_PMS_definePolicy_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_DemoAuth_With_Same_Policy_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_DemoAuth_With_Same_Policy_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip policy", "name": "$RUNCONTEXT$mosip policy 19234", "authSubType": "FINGER", "authType": "demo", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_009", "message": "$IGNORE$" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when DemoAuth uses an existing policy, uniqueIdentifier=TC_PMS_definePolicy_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_Missing_InputParameter_authTokenType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_authTokenType_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy group Neg2", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "$REMOVE$", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when the AuthTokenType input parameter is missing, uniqueIdentifier=TC_PMS_definePolicy_19, additionalDependencies=TC_PMS_definePolicyGroup_01 |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_Missing_InputParameter_authType_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_authType_neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy group Neg", "authSubType": "FINGER", "authType": "$REMOVE$", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$ID:DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicyNeg, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when the AuthType input parameter is missing, uniqueIdentifier=TC_PMS_definePolicy_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_Missing_InputParameter_desc_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_desc_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$REMOVE$", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when the policy description input parameter is missing, uniqueIdentifier=TC_PMS_definePolicy_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_Missing_InputParameter_mandatory_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_mandatory_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy group Neg 1", "authSubType": "FINGER", "authType": "bio", "mandatory": $REMOVE$, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$ID:DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "allowedKycAttributes": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicyNeg, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when a mandatory input parameter is missing, uniqueIdentifier=TC_PMS_definePolicy_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_Missing_InputParameter_name_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_name_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "$REMOVE$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when the policy name input parameter is missing, uniqueIdentifier=TC_PMS_definePolicy_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_Missing_InputParameter_policyGroupName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_policyGroupName_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$REMOVE$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when the policyGroupName input parameter is missing, uniqueIdentifier=TC_PMS_definePolicy_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_Missing_InputParameter_policyType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_policyType_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "$REMOVE$", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when the policyType input parameter is missing, uniqueIdentifier=TC_PMS_definePolicy_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_PolicyGrpInActive_InValid_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_PolicyGrpInActive_InValid_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy 192345", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_053" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when the specified policy group is inactive, uniqueIdentifier=TC_PMS_definePolicy_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_PolicyGrpNotExists_InValid_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_PolicyGrpNotExists_InValid_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "asbgdfg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_019" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when the specified policy group does not exist, uniqueIdentifier=TC_PMS_definePolicy_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_RandomTokenType_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_RandomTokenType_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip policy2", "name": "$RUNCONTEXT$mosip policy2 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": false, "attributeName": "string", "authTokenType": "random", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "name": "$RUNCONTEXT$mosip policy2", "desc": "$RUNCONTEXT$desc mosip policy2", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/policy/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy is successfully created with a random token type, uniqueIdentifier=TC_PMS_definePolicy_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_Remove_Demo_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_Remove_Demo_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy5", "name": "mosip policy5 Neg", "authSubType": "FINGER", "authType": "$REMOVE$", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$ID:DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicyNeg, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy update fails when Demo authentication is removed, uniqueIdentifier=TC_PMS_definePolicy_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_demo_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_demo_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip policy9", "name": "$RUNCONTEXT$mosip policy9 Neg", "authSubType": "FINGER", "authType": "demo", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$ID:DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid_name$", "name": "$RUNCONTEXT$mosip policy9 Neg", "desc": "$RUNCONTEXT$desc mosip policy9", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy is successfully created using Demo authentication, uniqueIdentifier=TC_PMS_definePolicy_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_when_authTokenType_invalid_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_when_authTokenType_invalid_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy9", "name": "mosip policy9 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "162g@fsgs", "policyGroupName": "$ID:DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when the AuthTokenType is invalid, uniqueIdentifier=TC_PMS_definePolicy_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_when_authTokenType_missing_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_when_authTokenType_missing_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy9", "name": "mosip policy9 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "$REMOVE$", "policyGroupName": "$ID:DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when the AuthTokenType parameter is missing, uniqueIdentifier=TC_PMS_definePolicy_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_when_authTokenType_null_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_when_authTokenType_null_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy9", "name": "mosip policy9 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "", "policyGroupName": "$ID:DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when the AuthTokenType is null, uniqueIdentifier=TC_PMS_definePolicy_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefinePolicy_without_AuthTypeToken_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefinePolicy_without_AuthTypeToken_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "$IGNORE$", "policyGroupName": "$ID:DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy creation fails when the AuthTypeToken is not provided, uniqueIdentifier=TC_PMS_definePolicy_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineMISPPolicy_All_Valid_Smoke_pms_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineMISPPolicy_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "policyGroupName": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_name$", "policyType": "MISP", "name": "$RUNCONTEXT$mosip policy MISP API Policy 12345", "desc": "$RUNCONTEXT$desc mosip policy MISP API Policy 12345", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_name$", "is_Active": false }, inputTemplate=pms/DefinePolicy/DefineMISPPolicy, outputTemplate=pms/DefinePolicy/DefineMISPPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP policy is successfully created when all inputs are valid, uniqueIdentifier=TC_PMS_DefineMISPPolicy_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$mosip data share policy", "name": "$RUNCONTEXT$mosip data share policy", "policyId": "$RUNCONTEXT$MDSP", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "name": "$RUNCONTEXT$mosip data share policy", "desc": "$RUNCONTEXT$mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy succeeds for all valid inputs, uniqueIdentifier=TC_PMS_defineDataSharePolicy_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_All_for_Update_smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_All_for_Update_smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$desc mosip policy group for req key For Update", "name": "$RUNCONTEXT$mosip policy group for req key For Update", "policyId": "$RUNCONTEXT$MDSPFU", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "name": "$RUNCONTEXT$mosip data share policy", "desc": "$RUNCONTEXT$mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a data share policy succeeds for all valid inputs, uniqueIdentifier=TC_PMS_defineDataSharePolicy_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_All_for_req_ApiKey_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_All_for_req_ApiKey_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$mosip data share policy ApiKey", "name": "$RUNCONTEXT$mosip data share policy ApiKey", "policyId": "$RUNCONTEXT$MDSPFA", "policyGroupName": "$ID:DefinePolicyGroup_for_Get_ApiKey_With_Deactive_Partner_All_Valid_Smoke_pms_sid_name$", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:DefinePolicyGroup_for_Get_ApiKey_With_Deactive_Partner_All_Valid_Smoke_pms_sid_name$", "name": "$RUNCONTEXT$mosip data share policy", "desc": "$RUNCONTEXT$mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy succeeds for all valid API key request, uniqueIdentifier=TC_PMS_defineDataSharePolicy_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_AttributeName_Custom_Name_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_AttributeName_Custom_Name_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$mosip data share policy", "name": "$RUNCONTEXT$mosip data share policyk", "policyId": "$RUNCONTEXT$MDSPm", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"custom name", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "name": "$RUNCONTEXT$mosip data share policyk", "desc": "$RUNCONTEXT$mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when an custom attribute name is provided, uniqueIdentifier=TC_PMS_defineDataSharePolicy_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_Cancelling_the_create_dataSharePolicy |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_Cancelling_the_create_dataSharePolicy, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$mosip data share policy", "name": "$RUNCONTEXT$mosip data share policy name", "policyId": "$RUNCONTEXT$MDSP239fhfdndn", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "name": "$RUNCONTEXT$mosip data share policy name", "desc": "$RUNCONTEXT$mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the creation of a data share policy is cancelled successfully when the operation is aborted before submission, uniqueIdentifier=TC_PMS_defineDataSharePolicy_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_EncryptionType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_EncryptionType_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$mosip data share policy", "name": "$RUNCONTEXT$mosip data share policyh", "policyId": "$RUNCONTEXT$MDSPHH", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "none", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "name": "$RUNCONTEXT$mosip data share policyh", "desc": "$RUNCONTEXT$mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when an invalid encryptionType is provided, uniqueIdentifier=TC_PMS_defineDataSharePolicy_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_InActive_policyGroup |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_InActive_policyGroup, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_name$", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_053" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when the associated policy group is inactive, uniqueIdentifier=TC_PMS_defineDataSharePolicy_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_IndividualBiometrics_Attribute |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_IndividualBiometrics_Attribute, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$mosip data share policy", "name": "$RUNCONTEXT$mosip data share policyb", "policyId": "$RUNCONTEXT$MDSPB", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"individualBiometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "name": "$RUNCONTEXT$mosip data share policyb", "desc": "$RUNCONTEXT$mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy succeeds when individual biometrics attributes are included, uniqueIdentifier=TC_PMS_defineDataSharePolicy_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_RemovedAttribute_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_RemovedAttribute_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy7", "name": "mosip data share policy7", "policyId": "MDSP", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "attributeName":"$REMOVE$", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when a removed attribute is included in the request, uniqueIdentifier=TC_PMS_defineDataSharePolicy_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_ToCheckStatus_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_ToCheckStatus_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$mosip data share policy check status", "name": "$RUNCONTEXT$mosip data share policy to check status22", "policyId": "$RUNCONTEXT$MDSP8", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "name": "$RUNCONTEXT$mosip data share policy to check status22", "desc": "$RUNCONTEXT$mosip data share policy check status", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the status of a data share policy can be checked successfully for valid inputs, uniqueIdentifier=TC_PMS_defineDataSharePolicy_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_WithoutMandatoryFields_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_WithoutMandatoryFields_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$mosip data share policy2", "name": "$RUNCONTEXT$mosip data share policy2", "policyId": "$RUNCONTEXT$MDSP2", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"$REMOVE$", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "name": "$RUNCONTEXT$mosip data share policy2", "desc": "$RUNCONTEXT$mosip data share policy2", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when mandatory fields are not provided, uniqueIdentifier=TC_PMS_defineDataSharePolicy_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_Zipcode_Attribute |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_Zipcode_Attribute, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$mosip data share policy", "name": "$RUNCONTEXT$mosip data share policyd", "policyId": "$RUNCONTEXT$MDSPC", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"Zipcode", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "name": "$RUNCONTEXT$mosip data share policyd", "desc": "$RUNCONTEXT$mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy succeeds when the zipcode attribute is included, uniqueIdentifier=TC_PMS_defineDataSharePolicy_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_duplicate_policy_name |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_duplicate_policy_name, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$mosip data share policy", "name": "$RUNCONTEXT$mosip data share policy", "policyId": "$RUNCONTEXT$MDSP", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_009" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when a duplicate policy name is provided, uniqueIdentifier=TC_PMS_defineDataSharePolicy_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_format_SpaceVal |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_format_SpaceVal, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$mosip data share policy", "name": "$RUNCONTEXT$mosip data share policya", "policyId": "$RUNCONTEXT$MDSPA", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":" ", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "name": "$RUNCONTEXT$mosip data share policya", "desc": "$RUNCONTEXT$mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when fields contain only space values formatting, uniqueIdentifier=TC_PMS_defineDataSharePolicy_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_invalid_policy_grp_name |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_invalid_policy_grp_name, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "abcd", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_019" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when an invalid policy group name is provided, uniqueIdentifier=TC_PMS_defineDataSharePolicy_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_invalid_policy_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_invalid_policy_type, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "abcd", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_023" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when an invalid policy type is provided, uniqueIdentifier=TC_PMS_defineDataSharePolicy_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_missing_PolicyGrpName |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_missing_PolicyGrpName, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "$REMOVE$", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when the policy group name is missing, uniqueIdentifier=TC_PMS_defineDataSharePolicy_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_missing_PolicyType |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_missing_PolicyType, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "$REMOVE$", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when the policy type is missing, uniqueIdentifier=TC_PMS_defineDataSharePolicy_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_missing_descr |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_missing_descr, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$REMOVE$", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when the policy description is missing, uniqueIdentifier=TC_PMS_defineDataSharePolicy_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_missing_name |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_missing_name, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "$REMOVE$", "policyId": "MDSP", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when the policy name is missing, uniqueIdentifier=TC_PMS_defineDataSharePolicy_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_shareDomain_https_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_shareDomain_https_Smoke, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$RUNCONTEXT$mosip data share policy", "name": "$RUNCONTEXT$mosip data share policyg", "policyId": "$RUNCONTEXT$MDSPGG", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "https", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "name": "$RUNCONTEXT$mosip data share policyg", "desc": "$RUNCONTEXT$mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy succeeds when the shareDomain is provided with a valid HTTPS URL, uniqueIdentifier=TC_PMS_defineDataSharePolicy_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_typeOfShare_Direct_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_typeOfShare_Direct_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyf", "policyId": "MDSPEE", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Direct", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when typeOfShare is set to an invalid value Direct, uniqueIdentifier=TC_PMS_defineDataSharePolicy_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_typeOfShare_Remove_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_typeOfShare_Remove_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyi", "policyId": "MDSPEE", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "typeOfShare": "$REMOVE$", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when the typeOfShare attribute is removed from the request, uniqueIdentifier=TC_PMS_defineDataSharePolicy_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_typeOfShare_SpaceVal_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_typeOfShare_SpaceVal_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policye", "policyId": "MDSPDD", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "typeOfShare": " ", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when the typeOfShare field contains only space values, uniqueIdentifier=TC_PMS_defineDataSharePolicy_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DefineDataSharePolicy_without_policyId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_DefineDataSharePolicy_without_policyId, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy without policy id", "policyId": "$REMOVE$", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that defining a data share policy fails when the policyId is missing, uniqueIdentifier=TC_PMS_defineDataSharePolicy_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicy_Invalid_InputParameter_policyID |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicy_Invalid_InputParameter_policyID, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy", "policyId": "1234abcxz", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_008", "message": "Policy ID does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a policy fails when an invalid policy ID is provided, uniqueIdentifier=TC_PMS_createUpdatePolicy_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicy_Invalid_PolicyID |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicy_Invalid_PolicyID, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy", "policyId": "asfgref", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_008", "message": "Policy ID does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a policy fails when an invalid policy ID is provided, uniqueIdentifier=TC_PMS_createUpdatePolicy_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicy_Invalid_PolicygroupName |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicy_Invalid_PolicygroupName, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "asfgrrw", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_019", "message": "Policy group name does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a policy fails when an invalid policy group name is provided, uniqueIdentifier=TC_PMS_createUpdatePolicy_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicy_Missing_InputParameter_authTokenType_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicy_Missing_InputParameter_authTokenType_neg, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy missing neg", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "$REMOVE$", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006", "message": "Missing input parameter - authTokenType" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a policy fails when the authentication token type is missing, uniqueIdentifier=TC_PMS_createUpdatePolicy_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicy_Missing_InputParameter_desc |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicy_Missing_InputParameter_desc, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "$REMOVE$", "name": "mosip policy", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.desc" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a policy fails when the policy description is missing, uniqueIdentifier=TC_PMS_createUpdatePolicy_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicy_Missing_InputParameter_name |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicy_Missing_InputParameter_name, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "$REMOVE$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.name" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a policy fails when the policy name is missing, uniqueIdentifier=TC_PMS_createUpdatePolicy_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicy_Missing_InputParameter_policyGroupName_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicy_Missing_InputParameter_policyGroupName_neg, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$REMOVE$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.policyGroupName" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a policy fails when the policy group name is missing, uniqueIdentifier=TC_PMS_createUpdatePolicy_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyStatus_Active_InValid |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyStatus_Active_InValid, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "status":"active", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_054", "message": "Cannot activate unpublished policy." } ] }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that activating a policy fails when invalid inputs are provided, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyStatus_DeActive_auth_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyStatus_DeActive_auth_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "status":"De-Active", "requesttime": "$TIMESTAMP$" }, output= { "message": "status updated successfully" }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatusResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy can be deactivated successfully using valid authentication details, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyStatus_DeActive_datashare_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyStatus_DeActive_datashare_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "policygroupId":"$ID:DefinePolicyGroup_Active_All_Valid_Smoke_sid_id$", "status":"De-Active", "requesttime": "$TIMESTAMP$" }, output= { "message": "status updated successfully" }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatusResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a data share policy can be deactivated successfully with valid inputs, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyStatus_Missing_status_InValid |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyStatus_Missing_status_InValid, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "status":"$REMOVE$", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_COR_003", "message": "Could not process the request" } ] }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a policy status fails when the status value is missing, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyStatus_PolicyGroupId_InValid |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyStatus_PolicyGroupId_InValid, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "policygroupId":"asfbvef", "status":"Active", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_016", "message": "Policy Group ID does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a policy status fails when an invalid policy group ID is provided, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyStatus_PolicyId_InValid |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyStatus_PolicyId_InValid, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "asfgv", "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "status":"Active", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_008", "message": "Policy ID does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the status of a policy fails when an invalid policy ID is provided, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyStatus_status_InValid |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyStatus_status_InValid, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "status":"asfg", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_045", "message": "Policy Status either Active or De-active." } ] }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a policy status fails when an invalid status value is provided, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_PublishDataSharePolicy_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Partner_PublishDataSharePolicy_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Active_All_Valid_Smoke_sid_id$", "policyId": "$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "DataShare", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a partner can publish a data share policy successfully with all valid inputs, uniqueIdentifier=TC_PMS_publishPolicy_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PublishPolicy_All_Valid_ForInProgressPolicyMapping |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_PublishPolicy_All_Valid_ForInProgressPolicyMapping, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_For_InProgressMapping_Policy_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy can be published successfully when associated policy mappings are in progress, uniqueIdentifier=TC_PMS_publishPolicy_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PublishPolicy_All_Valid_ForRejectPolicyMapping |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_PublishPolicy_All_Valid_ForRejectPolicyMapping, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_For_Reject_Policy_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy can be published successfully even when associated policy mappings are rejected, uniqueIdentifier=TC_PMS_publishPolicy_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PublishPolicy_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_PublishPolicy_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy can be published successfully with all valid inputs, uniqueIdentifier=TC_PMS_publishPolicy_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PublishPolicy_All_Valid_Smoke_ForNeg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_PublishPolicy_All_Valid_Smoke_ForNeg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that publishing a policy succeeds with all valid inputs intended for negative test scenarios, uniqueIdentifier=TC_PMS_publishPolicy_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PublishPolicy_All_Valid_forDeactivatePolicyGroup_ForNeg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_PublishPolicy_All_Valid_forDeactivatePolicyGroup_ForNeg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_For_Published_Policy_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that publishing a policy succeeds for a deactivated policy group intended for negative test scenarios, uniqueIdentifier=TC_PMS_publishPolicy_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PublishPolicy_ForDeactive_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_PublishPolicy_ForDeactive_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_ForDeactivatePolicy_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy can be published successfully even when associated with a deactivated policy group, uniqueIdentifier=TC_PMS_publishPolicy_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PublishPolicy_InValid_AlreadyPublished_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_PublishPolicy_InValid_AlreadyPublished_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_020" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that publishing a policy fails when the policy has already been published, uniqueIdentifier=TC_PMS_publishPolicy_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PublishPolicy_InValid_policyId_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_PublishPolicy_InValid_policyId_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "afgrwfg", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_008" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that publishing a policy fails when an invalid policy ID is provided, uniqueIdentifier=TC_PMS_publishPolicy_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PublishPolicy_InValid_policygroupId_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_PublishPolicy_InValid_policygroupId_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "sgdasfgbv", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_016" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that publishing a policy fails when an invalid policy group ID is provided, uniqueIdentifier=TC_PMS_publishPolicy_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PublishPolicy_MISPPolicy_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_PublishPolicy_MISPPolicy_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_name$", "is_Active": true }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyMISPResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP policy can be published successfully with all valid inputs, uniqueIdentifier=TC_PMS_publishMISPPolicy_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PublishPolicy_invalid_auth_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_PublishPolicy_invalid_auth_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=invalidtoken, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that publishing a policy fails when invalid authentication details are provided, uniqueIdentifier=TC_PMS_publishPolicy_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllActivePolicyGroups_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllActivePolicyGroups_All_Valid_Smoke, endPoint=/v1/policymanager/policies/policy-groups, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroups, outputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroupsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all active policy groups are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetAllActivePolicyGroups_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllActivePolicyGroups_Invalid_auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllActivePolicyGroups_Invalid_auth, endPoint=/v1/policymanager/policies/policy-groups, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroups, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving all active policy groups fails when an invalid authentication is provided, uniqueIdentifier=TC_PMS_GetAllActivePolicyGroups_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllActivePolicyGroups_without_auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllActivePolicyGroups_without_auth, endPoint=/v1/policymanager/policies/policy-groups, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroups, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving all active policy groups fails when authentication is not provided, uniqueIdentifier=TC_PMS_GetAllActivePolicyGroups_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPolicy_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPolicy_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/{policyId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$" }, output= { "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "policyGroupDesc": "$RUNCONTEXT$desc mosip policy group19234", "policyGroupStatus": true, "policyName": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_name$", "policyDesc": "$RUNCONTEXT$desc mosip policy 19234", "authTokenType": "partner" }, inputTemplate=pms/policy/GetPolicy/getPolicy, outputTemplate=pms/policy/GetPolicy/getPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all policies can be retrieved successfully for valid inputs, uniqueIdentifier=TC_PMS_getPolicy_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPolicy_Invalid_InputParameter_policyId |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPolicy_Invalid_InputParameter_policyId, endPoint=/v1/policymanager/policies/{policyId}, role=partner, templateFields=null, input={ "policyId": "policy123456" }, output={ "errors": [ { "errorCode": "PMS_POL_008", "message": "Policy ID does not exist" } ] }, inputTemplate=pms/policy/GetPolicy/getPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving a policy fails when an invalid policyId is provided, uniqueIdentifier=TC_PMS_getPolicy_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_AllValid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_AllValid_Smoke, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "policyType": "DataShare", "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policies can be searched and retrieved successfully for all valid inputs, uniqueIdentifier=TC_PMS_createSearchPartner_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_Only_FilterCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_Only_FilterCriteria_Smoke, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "Data Share2" } ], "policyType": "DataShare", "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policies can be searched successfully using only filter criteria, uniqueIdentifier=TC_PMS_createSearchPartner_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_Only_PaginationCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_Only_PaginationCriteria_Smoke, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "policyType": "DataShare", "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policies can be searched successfully using only pagination, uniqueIdentifier=TC_PMS_createSearchPartner_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_Only_SortaCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_Only_SortaCriteria_Smoke, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policies can be searched successfully using only sorting, uniqueIdentifier=TC_PMS_createSearchPartner_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_type_contains_Smoke_asc |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_type_contains_Smoke_asc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "data share" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "version": "1.0", "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policies can be searched successfully when the type contains a given value sorted in ascending order, uniqueIdentifier=TC_PMS_createSearchPartner_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_type_contains_Smoke_desc |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_type_contains_Smoke_desc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "data share" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "version": "1.0", "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policies can be searched successfully when the type contains a given value sorted in descending order, uniqueIdentifier=TC_PMS_createSearchPartner_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_type_equals_Smoke_asc |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_type_equals_Smoke_asc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "equals", "value": "$RUNCONTEXT$mosip data share policy" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policies can be searched successfully when the type equals a given value sorted in ascending order, uniqueIdentifier=TC_PMS_createSearchPartner_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_type_equals_Smoke_desc |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_type_equals_Smoke_desc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "equals", "value": "$RUNCONTEXT$mosip data share policy" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policies can be searched successfully when the type equals a given value sorted in descending order, uniqueIdentifier=TC_PMS_createSearchPartner_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_type_startswith_Smoke_asc |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_type_startswith_Smoke_asc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "mosip" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policies can be searched successfully when the type starts with a given value sorted in ascending order, uniqueIdentifier=TC_PMS_createSearchPartner_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_type_startswith_Smoke_desc |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_type_startswith_Smoke_desc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "mosip" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "version": "1.0", "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policies can be searched successfully when the type starts with a given value sorted in descending order, uniqueIdentifier=TC_PMS_createSearchPartner_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_with_invalid_columnName |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_with_invalid_columnName, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "n@@@@@343e", "type": "startswith", "value": "Data Share2" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-310" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching policies fails when an invalid column name is provided, uniqueIdentifier=TC_PMS_createSearchPartner_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_with_invalid_sort_field |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_with_invalid_sort_field, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "mosip" } ], "sort": [ { "sortField": "n@@@@3334$$$e", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-357" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching policies fails when an invalid sort field is provided, uniqueIdentifier=TC_PMS_createSearchPartner_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_with_invalid_sort_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_with_invalid_sort_type, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "Data Share2" } ], "sort": [ { "sortField": "name", "sortType": "dc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching policies fails when an invalid sort type is provided, uniqueIdentifier=TC_PMS_createSearchPartner_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_with_invalid_value_contains |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_with_invalid_value_contains, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": ")()()****$$$$$$$$$$)))" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching policies returns fails when an invalid value is used with the contains filter, uniqueIdentifier=TC_PMS_createSearchPartner_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_with_invalid_value_equals |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_with_invalid_value_equals, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "equals", "value": "Da@@3344" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching policies returns fails when an invalid value is used with the equals filter, uniqueIdentifier=TC_PMS_createSearchPartner_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_with_invalid_value_startswith |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_with_invalid_value_startswith, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "Da@@3344" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching policies returns fails when an invalid value is used with the starts with filter, uniqueIdentifier=TC_PMS_createSearchPartner_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_with_missing_columnName |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_with_missing_columnName, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "$REMOVE$", "type": "startswith", "value": "mosip" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS_COR_003" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching policies fails when the column name is missing, uniqueIdentifier=TC_PMS_createSearchPartner_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_with_missing_sort_field |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_with_missing_sort_field, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "Data Share2" } ], "sort": [ { "sortField": "$REMOVE$", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching policies fails when the sort field is missing, uniqueIdentifier=TC_PMS_createSearchPartner_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_with_missing_sort_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_with_missing_sort_type, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "mosip" } ], "sort": [ { "sortField": "name", "sortType": "$REMOVE$" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching policies fails when the sort type is missing, uniqueIdentifier=TC_PMS_createSearchPartner_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicy_with_missing_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicy_with_missing_type, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "$REMOVE$", "value": "Data Share2" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-312" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching policies fails when the type filter is missing, uniqueIdentifier=TC_PMS_createSearchPartner_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_PrintPartner_AllValid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_PrintPartner_AllValid_Smoke_sid, endPoint=/v1/partnermanager/partners/v2, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "$RUNCONTEXT$mosipprint@gmail.com", "organizationName": "$RUNCONTEXT$mosipprint", "partnerId": "$RUNCONTEXT$mosipprint", "partnerType": "Print_Partner", "policyGroup":"$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "requesttime": "$TIMESTAMP$" }, output={ "partnerId": "$RUNCONTEXT$mosipprint", "status": "InProgress" }, inputTemplate=pms/PrintPartner/CreatePartner/createPartner, outputTemplate=pms/PrintPartner/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a partner’s self-registration details can be printed successfully for all valid inputs, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_printpartner_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_PrintPartner_DuplicateEmail_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_PrintPartner_DuplicateEmail_Neg, endPoint=/v1/partnermanager/partners/v2, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "$RUNCONTEXT$mosipprint@gmail.com", "organizationName": "$RUNCONTEXT$mosipprint", "partnerId": "$RUNCONTEXT$mosipprint", "partnerType": "Print_Partner", "policyGroup":"$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_011" } ] }, inputTemplate=pms/PrintPartner/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self-registration fails when a duplicate email is provided, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_PrintPartner_SpaceIn_PartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_PrintPartner_SpaceIn_PartnerId_Neg, endPoint=/v1/partnermanager/partners/v2, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "mosipprsint@gmail.com", "organizationName": "mosipprint", "partnerId": "mosip print", "partnerType": "Print_Partner", "policyGroup":"$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_066" } ] }, inputTemplate=pms/PrintPartner/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self-registration fails when the Partner ID contains only spaces, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$CACERT$", "partnerId": "$ID:PartnerSelfRegistration_PrintPartner_AllValid_Smoke_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/PrintPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/PrintPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that CA certificates can be uploaded successfully with all valid inputs, uniqueIdentifier=TC_PMS_uploadCACert_printpartner_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadIntermediateCertificate_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadIntermediateCertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$INTERCERT$", "partnerId": "$ID:PartnerSelfRegistration_PrintPartner_AllValid_Smoke_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/PrintPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/PrintPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid Intermediate Certificate for Print Partner, uniqueIdentifier=TC_PMS_uploadCACert_printpartner_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCert_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_PrintPartner_AllValid_Smoke_sid_partnerId$" }, output={}, inputTemplate=pms/PrintPartner/UploadCert/uploadCert, outputTemplate=pms/PrintPartner/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that certificates can be uploaded successfully with all valid inputs, uniqueIdentifier=TC_PMS_UploadPartnerCert_Printpartner_01, additionalDependencies=TC_PMS_uploadCACert_printpartner_01,TC_PMS_uploadCACert_printpartner_02 |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePrintPartner_AllValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePrintPartner_AllValid_smoke, endPoint=/v1/partnermanager/partners/v2/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_PrintPartner_AllValid_Smoke_sid_partnerId$", "address": "Benglore", "contactNumber": "9876453210", "requesttime": "$TIMESTAMP$" }, output={ "partnerId": "$ID:PartnerSelfRegistration_PrintPartner_AllValid_Smoke_sid_partnerId$", "status": "approved" }, inputTemplate=pms/PrintPartner/UpdatePrintPartner/UpdatePrintPartner, outputTemplate=pms/PrintPartner/UpdatePrintPartner/UpdatePrintPartnerResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a partners print details can be updated successfully with all valid inputs, uniqueIdentifier=TC_PMS_UpdatePrintPartner_01, additionalDependencies=TC_PMS_createPartnerSelfRegistration_printpartner_01 |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerDetails_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerDetails_allValid_smoke, endPoint=/v1/partnermanager/partners/v2, role=partner, templateFields=null, input={ "partnerType":"Print_Partner" }, output={ }, inputTemplate=pms/PrintPartner/GetPartnerDetails/GetPartnerDetails, outputTemplate=pms/PrintPartner/GetPartnerDetails/GetPartnerDetailsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner details can be retrieved successfully for all valid inputs, uniqueIdentifier=TC_PMS_GetPrintPartnerDetails_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_withoutPartnerRegister_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_withoutPartnerRegister_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys fails when the partner is not registered, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerWithoutPartnerRegister_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApprovedAuthPartnerId_BeforePartnerCreate_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApprovedAuthPartnerId_BeforePartnerCreate_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving approved authenticated partner IDs fails when the partner has not been created yet, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerIdNegative_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_PartnerSelfRegistration_All_for_Get_ApiKey_With_Deactive_Partner_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Partner_PartnerSelfRegistration_All_for_Get_ApiKey_With_Deactive_Partner_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$RUNCONTEXT$mosipsfgh@gmail.com", "organizationName": "$RUNCONTEXT$Tech-1233", "partnerId": "$RUNCONTEXT$Tech-1233", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_for_Get_ApiKey_With_Deactive_Partner_All_Valid_Smoke_pms_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$RUNCONTEXT$Tech-1233", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self registration and API key retrieval work correctly even when associated with a deactivated partner using valid inputs, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_PartnerSelfRegistration_AlreadyExisting_Policy_Name |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Partner_PartnerSelfRegistration_AlreadyExisting_Policy_Name, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosippp@gmail.com", "organizationName": "Techno", "partnerId": "$RUNCONTEXT$pms-111999", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PRT_051" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self registration fails when the policy name already exists, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_PartnerSelfRegistration_AlreadyExists_invalid_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Partner_PartnerSelfRegistration_AlreadyExists_invalid_neg, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$RUNCONTEXT$mosip2@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "$RUNCONTEXT$pms-111999", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PRT_051" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self registration fails when attempting to register a partner that already exists with invalid details, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_PartnerSelfRegistration_Deactive_Partner_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Partner_PartnerSelfRegistration_Deactive_Partner_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$RUNCONTEXT$mosipgh@gmail.com", "organizationName": "$RUNCONTEXT$Tech-321", "partnerId": "$RUNCONTEXT$Tech-321", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_for_Get_ApiKey_With_Deactive_Partner_All_Valid_Smoke_pms_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$RUNCONTEXT$Tech-321", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self registration fails when the partner ID is deactivated, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_PartnerSelfRegistration_InActive_policyGroup |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Partner_PartnerSelfRegistration_InActive_policyGroup, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mmo@gmail.com", "organizationName": "Techno", "partnerId": "Tech-3241", "partnerType": "Auth_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PMP_023" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self registration fails when the selected policy group is inactive, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_PartnerSelfRegistration_Missing_InputParameter_PartnerId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Partner_PartnerSelfRegistration_Missing_InputParameter_PartnerId, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip@gmail.com", "organizationName": "Techno", "partnerId": "$REMOVE$", "partnerType": "Auth_Partner", "policyGroup": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self registration fails when the Partner ID input parameter is missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_PartnerSelfRegistration_Missing_InputParameter_address |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Partner_PartnerSelfRegistration_Missing_InputParameter_address, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "$REMOVE$", "contactNumber": "8553967572", "emailId": "mosip@gmail.com", "organizationName": "Techno", "partnerId": "Tech-123", "partnerType": "Auth_Partner", "policyGroup": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self registration fails when the address input parameter is missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_PartnerSelfRegistration_Missing_InputParameter_contactNumber |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Partner_PartnerSelfRegistration_Missing_InputParameter_contactNumber, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "$REMOVE$", "emailId": "mosip@gmail.com", "organizationName": "Techno", "partnerId": "Tech-123", "partnerType": "Auth_Partner", "policyGroup": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self registration fails when the contact number input parameter is missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_PartnerSelfRegistration_Missing_InputParameter_emailId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Partner_PartnerSelfRegistration_Missing_InputParameter_emailId, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$REMOVE$", "organizationName": "Techno", "partnerId": "Tech-123", "partnerType": "Auth_Partner", "policyGroup": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self registration fails when the email ID input parameter is missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_PartnerSelfRegistration_Missing_InputParameter_partnerType |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Partner_PartnerSelfRegistration_Missing_InputParameter_partnerType, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip@gmail.com", "organizationName": "Techno", "partnerId": "Tech-123", "partnerType": "$REMOVE$", "policyGroup": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self registration fails when the partner type input parameter is missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_PartnerSelfRegistration_SpaceVAl_PartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Partner_PartnerSelfRegistration_SpaceVAl_PartnerId_Neg, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "moosip@gmail.com", "organizationName": "Techno", "partnerId": "Tech -123", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PRT_066" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self registration fails when the partner ID contains spaces, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_PartnerSelfRegistration_UpdatePolicyGroupForPartner_AllValid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Partner_PartnerSelfRegistration_UpdatePolicyGroupForPartner_AllValid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$RUNCONTEXT$update@gmail.com", "organizationName": "$RUNCONTEXT$updatepolicy", "partnerId": "$RUNCONTEXT$updatepolicy", "partnerType": "Auth_Partner", "policyGroup": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$RUNCONTEXT$updatepolicy", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a partner’s policy group can be successfully updated when all inputs are valid, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$RUNCONTEXT$mosip98763@gmail.com", "organizationName": "$RUNCONTEXT$pms-111999", "partnerId": "$RUNCONTEXT$pms-111999", "partnerType": "AUTH_PARTNER", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$RUNCONTEXT$pms-111999", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a partner successfully completes self registration when all required inputs are valid, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partnerdevice, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$RUNCONTEXT$mosip98768@gmail.com", "organizationName": "$RUNCONTEXT$pms-111998", "partnerId": "$RUNCONTEXT$pms-111998", "partnerType": "Device_Provider", "policyGroup": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$RUNCONTEXT$pms-111998", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a device provider successfully completes partner self registration with valid inputs, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partnerftm, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$RUNCONTEXT$mosip98788@gmail.com", "organizationName": "$RUNCONTEXT$pms-111888", "partnerId": "$RUNCONTEXT$pms-111888", "partnerType": "FTM_Provider", "policyGroup": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$RUNCONTEXT$pms-111888", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that an FTM provider successfully completes partner self registration when all inputs are valid, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_Missing_Email_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_Missing_Email_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "organizationName": "PMS_API_ABC_ORG", "partnerId": "1119911", "partnerType": "AUTH_PARTNER", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self registration fails when the email address is missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_Missing_Request_Time_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_Missing_Request_Time_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763125@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "1119910", "partnerType": "AUTH_PARTNER", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self registration fails when the request time is missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_PastDate_Request_Time_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_PastDate_Request_Time_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763123@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "11199911", "partnerType": "AUTH_PARTNER", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self registration fails when the request time is set to a past date, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_reuse_same_Email_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_reuse_same_Email_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$RUNCONTEXT$mosip98763@gmail.com", "organizationName": "$RUNCONTEXT$pms-111999", "partnerId": "$RUNCONTEXT$pms-111999", "partnerType": "AUTH_PARTNER", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_011" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner self registration fails when the same email address is reused, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$RUNCONTEXT$pms-111555", "organizationName": "$RUNCONTEXT$pms-111555", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$RUNCONTEXT$newmisppartnerapiauto@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output= { "partnerId": "$RUNCONTEXT$pms-111555", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP partner is successfully registered with all required valid inputs as part of a smoke test, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Empty_PolicyGroup_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Empty_PolicyGroup_sid, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$RUNCONTEXT$pms-111556", "organizationName": "$RUNCONTEXT$pms-111556", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$RUNCONTEXT$newmisppartner1@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output= { "partnerId": "$RUNCONTEXT$pms-111556", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an empty policy group, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_For_Without_PolicyId_Smoke_Sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_For_Without_PolicyId_Smoke_Sid, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$RUNCONTEXT$pms-112211", "organizationName": "$RUNCONTEXT$pms-112211", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$RUNCONTEXT$newmisppartner03@gmail.com", "partnerType": "MISP_Partner", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output= { "partnerId": "$RUNCONTEXT$pms-112211", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error or handles appropriately when attempting to register a MISP partner without providing a policy ID as part of a smoke test, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Max_AddressField_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Max_AddressField_sid, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$RUNCONTEXT$pms-111558", "organizationName": "$RUNCONTEXT$pms-111558", "address": "The Modular Open Source Identity Platform was established in 2018 to support governments in providing its residents with an official form of the most important human asset identity.As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial first step. With a foundational national ID system in place, a government can build effective civil registries, and service delivery systems, serving the population in a myriad of ways. Among other benefits, robust systems like these enable faster disaster relief, climate resilience, ease of starting new businesses, and better access to financial inclusion, healthcare, and education. As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial first step. With a foundational national ID system in place, a government can build effective civil registries, and service delivery systems, serving the population in a myriad of ways. Among other benefits, robust systems like these enable faster disaster relief, climate resilience, ease of starting new businesses, and better access to financial inclusion, healthcare, and education.As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial first step. With a foundational national ID system in place, a government can build effective civil registries, and service delivery systems, serving the population in a myriad of ways. Among other benefits, robust systems like these enable faster disaster relief, climate resilience, ease of starting new businesses, and better access to financial inclusion, healthcare, and education.As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial fiestaaa", "contactNumber": "8553967572", "emailId": "$RUNCONTEXT$newmisppartner3@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output= { "partnerId": "$RUNCONTEXT$pms-111558", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP partner can be successfully registered when the address field contains the maximum allowed number of characters, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Max_Contact_number_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Max_Contact_number_sid, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$RUNCONTEXT$pms-111559", "organizationName": "$RUNCONTEXT$pms-111559", "address": "Bangalore", "contactNumber": "8553967572918818", "emailId": "$RUNCONTEXT$newmisppartner4@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output= { "partnerId": "$RUNCONTEXT$pms-111559", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP partner can be successfully registered when the contact number field contains the maximum allowed digits, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Max_EmailID_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Max_EmailID_sid, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$RUNCONTEXT$pms-111550", "organizationName": "$RUNCONTEXT$pms-111550", "address": "Bangalore", "contactNumber": "8553967572918818", "emailId": "$RUNCONTEXT$this.is.a.really.long.fake.email.address.created.for.testing.purposespurposespurposespurposespurpos.and.demonstration.so.please.do.not.try.to.use.it.in.real.life.situations.because.it.is.not.valid@verylongdomainexampleforvalidationtestingpurpos1.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output= { "partnerId": "$RUNCONTEXT$pms-111550", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP partner can be successfully registered when the email ID field contains the maximum allowed characters, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_With_Not_Uploading_Certificate_Smoke_Sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_With_Not_Uploading_Certificate_Smoke_Sid, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$RUNCONTEXT$pms-111545", "organizationName": "$RUNCONTEXT$pms-111545", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$RUNCONTEXT$newmisppartnerapiauto01@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output= { "partnerId": "$RUNCONTEXT$pms-111545", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API handles MISP partner registration successfully even when the certificate is not uploaded as part of a smoke test, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$RUNCONTEXT$pms-111557", "organizationName": "$RUNCONTEXT$pms-111557", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$RUNCONTEXT$newmisppartner2@gmail.com", "partnerType": "MISP_Partner", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output= { "partnerId": "$RUNCONTEXT$pms-111557", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error or handles appropriately when attempting to register a MISP partner without providing a policy group as part of a smoke test, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_valid_langcode_Arabic_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_valid_langcode_Arabic_sid, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$RUNCONTEXT$pms-111551", "organizationName": "$RUNCONTEXT$pms-111551", "address": "Bangalore", "contactNumber": "8553967571", "emailId": "$RUNCONTEXT$newmisppartner5@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "ara" }, output= { "partnerId": "$RUNCONTEXT$pms-111551", "status": "InProgress" }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP partner can be successfully registered when the language code is set to Arabic, uniqueIdentifier=TC_PMS_CreateMISPPartnerRegistration_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_-1_EmailID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_-1_EmailID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "-1", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_PRT_012" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with -1 provided as the email ID, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_2000+_Words_Address_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_2000+_Words_Address_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "The Modular Open Source Identity Platform was established in 2018 to support governments in providing its residents with an official form of the most important human asset identity.As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial first step. With a foundational national ID system in place, a government can build effective civil registries, and service delivery systems, serving the population in a myriad of ways. Among other benefits, robust systems like these enable faster disaster relief, climate resilience, ease of starting new businesses, and better access to financial inclusion, healthcare, and education. As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial first step. With a foundational national ID system in place, a government can build effective civil registries, and service delivery systems, serving the population in a myriad of ways. Among other benefits, robust systems like these enable faster disaster relief, climate resilience, ease of starting new businesses, and better access to financial inclusion, healthcare, and education.As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial first step. With a foundational national ID system in place, a government can build effective civil registries, and service delivery systems, serving the population in a myriad of ways. Among other benefits, robust systems like these enable faster disaster relief, climate resilience, ease of starting new businesses, and better access to financial inclusion, healthcare, and education.As nations around the world proceed on their digital transformation journeys towards true digital economies, a robust and secure national ID system is the crucial fiestaaaTheMOSIPMOSIP", "contactNumber": "8553967572", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an address field containing more than 2000 words, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Empty_Address_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Empty_Address_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "", "contactNumber": "8553967572", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an empty address field, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Empty_ContactNumber_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Empty_ContactNumber_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an empty contact number, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Empty_Email_Address_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Empty_Email_Address_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$REMOVE$", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an empty email address, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Empty_OrganizationName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Empty_OrganizationName_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": " ", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an empty organization name, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Empty_PartnerID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Empty_PartnerID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an empty partner ID, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Empty_PartnerType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Empty_PartnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461782919221434", "emailId": "newmisppartner@gmail.com", "partnerType": "", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an empty partner type, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Empty_RequestID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Empty_RequestID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": " ", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an empty request ID, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Empty_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": " ", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an empty request time, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Empty_langcode_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Empty_langcode_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner13@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": " " }, output={ "errors": [ { "errorCode": "PMS_PRT_056" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an empty language code, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Invalid_Email_Address_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Invalid_Email_Address_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner@@@@@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_PRT_012" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an invalid email address format, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Invalid_PartnerType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Invalid_PartnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$RUNCONTEXT$pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner14@gmail.com", "partnerType": "MISP", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_PRT_010" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an invalid partner type, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Invalid_PolicyGroup_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Invalid_PolicyGroup_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$RUNCONTEXT$pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner01@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "Automation-invalid-policy-group", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_PRT_002" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an invalid policy group, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Invalid_RequestID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Invalid_RequestID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner using an invalid request ID, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Invalid_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Invalid_Version_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "version-1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an invalid version value, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Invalid_langcode_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Invalid_langcode_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner15@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "engfrara" }, output={ "errors": [ { "errorCode": "PMS_PRT_056" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an invalid language code, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Missing_OrganizationName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Missing_OrganizationName_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "$REMOVE$", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner11@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with the organization name field missing from the request, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Missing_PartnerID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Missing_PartnerID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$REMOVE$", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with the partner ID field missing from the request, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_03, additionalDependencies=TC_PMS_definePolicyGroup_01 |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Null_Address_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Null_Address_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": null, "contactNumber": "8553967572", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with a null value in the address field, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_SpecialCharacters_PolicyGroup_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_SpecialCharacters_PolicyGroup_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$RUNCONTEXT$pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner02@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "^^!^(**%", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_PRT_002" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with special characters in the policy group field, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Version_value0_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Version_value0_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner using an unsupported version value 0, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_30, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_Version_value1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_Version_value1_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner using an unsupported version value 1, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_existing_EmailID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_existing_EmailID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "$RUNCONTEXT$newmisppartnerapiauto@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_PRT_011" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner using an already existing email ID, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_32, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_existing_PartnerID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_existing_PartnerID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$RUNCONTEXT$pms-111555", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "$RUNCONTEXT$newmisppartner10@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_PRT_051" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner using an already existing Partner ID, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_33, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_maxlength_ContactNumber_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_maxlength_ContactNumber_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461782919221434", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with a contact number exceeding the maximum allowed length, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_maxlength_EmailID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_maxlength_EmailID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461782919221434", "emailId": "this.is.a.really.long.fake.email.address.created.only.for.testing.purposespurposespurposespurposespurpos.and.demonstration.so.please.do.not.try.to.use.it.in.real.life.situations.because.it.is.not.valid@verylongdomainexampleforvalidationtestingpurposeeseseseee.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with an email ID exceeding the maximum allowed length, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_null_RequestID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_null_RequestID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": null, "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with a null request ID, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_null_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_null_Version_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "null", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner with a null version value, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_without_Access_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_without_Access_Token_Neg, endPoint=/v1/partnermanager/partners/v3, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "8553967572", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner without providing an access token, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_without_RequestID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_without_RequestID_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner without providing a request ID, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_without_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_without_RequestTime_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "version": "1.0", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner without providing the request time, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_31, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerRegistration_without_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_MISPPartnerRegistration_without_Version_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.create.partner.post", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111444", "organizationName": "MISP", "address": "Bangalore", "contactNumber": "9876554461", "emailId": "newmisppartner@gmail.com", "partnerType": "MISP_Partner", "policyGroup": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "logoUrl": "https://example.com/logo.png", "langCode": "eng" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/CreatePartner/CreateMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to register a MISP partner without providing a version, uniqueIdentifier=TC_PMS_CreateMISPPartnerSelfRegistrationNegativeScenarios_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_All_Valid_Smoke_For_Partner_111550 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke_For_Partner_111550, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPCACERT$", "partnerId": "$ID:MISPPartnerRegistration_Max_EmailID_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid CA certificate for Misp Partner 111550, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_All_Valid_Smoke_For_Partner_111551 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke_For_Partner_111551, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPCACERT$", "partnerId": "$ID:MISPPartnerRegistration_valid_langcode_Arabic_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid CA certificate for Misp Partner 111551, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_All_Valid_Smoke_For_Partner_111555 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke_For_Partner_111555, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPCACERT$", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify that the system allows successful CA certificate upload for partner ID 111555 when all mandatory and valid inputs are provided., uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_All_Valid_Smoke_For_Partner_111557 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke_For_Partner_111557, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPCACERT$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid CA certificate for Misp Partner 111557, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_All_Valid_Smoke_For_Partner_111558 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke_For_Partner_111558, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPCACERT$", "partnerId": "$ID:MISPPartnerRegistration_Max_AddressField_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid CA certificate for Misp Partner 111558, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_All_Valid_Smoke_For_Partner_111559 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke_For_Partner_111559, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPCACERT$", "partnerId": "$ID:MISPPartnerRegistration_Max_Contact_number_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid CA certificate for Misp Partner 111559, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_All_Valid_Smoke_For_Partner_112211 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke_For_Partner_112211, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPCACERT$", "partnerId": "$ID:MISPPartnerRegistration_For_Without_PolicyId_Smoke_Sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid CA certificate for Misp Partner 112211, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_All_Valid_Smoke_Partner_111556 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke_Partner_111556, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPCACERT$", "partnerId": "$ID:MISPPartnerRegistration_Empty_PolicyGroup_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a CA certificate is uploaded successfully with all required valid inputs, as part of a smoke test, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadSUBCACertificate_All_Valid_Smoke_For_Partner_111550 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadSUBCACertificate_All_Valid_Smoke_For_Partner_111550, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPINTERCERT$", "partnerId": "$ID:MISPPartnerRegistration_Max_EmailID_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid SUBCA certificate for Misp Partner 111550, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadSUBCACertificate_All_Valid_Smoke_For_Partner_111551 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadSUBCACertificate_All_Valid_Smoke_For_Partner_111551, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPINTERCERT$", "partnerId": "$ID:MISPPartnerRegistration_valid_langcode_Arabic_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid SUBCA certificate for Misp Partner 111551, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadSUBCACertificate_All_Valid_Smoke_For_Partner_111555 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadSUBCACertificate_All_Valid_Smoke_For_Partner_111555, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPINTERCERT$", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify that the system allows successful Sub-CA certificate upload for partner ID 111555 when all mandatory and valid inputs are provided, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadSUBCACertificate_All_Valid_Smoke_For_Partner_111557 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadSUBCACertificate_All_Valid_Smoke_For_Partner_111557, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPINTERCERT$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid SUBCA certificate for Misp Partner 111557, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadSUBCACertificate_All_Valid_Smoke_For_Partner_111558 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadSUBCACertificate_All_Valid_Smoke_For_Partner_111558, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPINTERCERT$", "partnerId": "$ID:MISPPartnerRegistration_Max_AddressField_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid SUBCA certificate for Misp Partner 111558, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadSUBCACertificate_All_Valid_Smoke_For_Partner_111559 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadSUBCACertificate_All_Valid_Smoke_For_Partner_111559, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPINTERCERT$", "partnerId": "$ID:MISPPartnerRegistration_Max_Contact_number_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid SUBCA certificate for Misp Partner 111559, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadSUBCACertificate_All_Valid_Smoke_For_Partner_112211 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadSUBCACertificate_All_Valid_Smoke_For_Partner_112211, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPINTERCERT$", "partnerId": "$ID:MISPPartnerRegistration_For_Without_PolicyId_Smoke_Sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid SUBCA certificate for Misp Partner 112211, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadSUBCACertificate_All_Valid_Smoke_Partner_111556 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadSUBCACertificate_All_Valid_Smoke_Partner_111556, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPINTERCERT$", "partnerId": "$ID:MISPPartnerRegistration_Empty_PolicyGroup_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateRoot, outputTemplate=pms/MISPPartnerV3/UploadCertificate/UploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a Sub-CA certificate is uploaded successfully with all required valid inputs as part of a smoke test, uniqueIdentifier=TC_PMS_UploadCertificateMISPCASUBCA_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadMISPPartnerCertificate_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadMISPPartnerCertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertificate, outputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify that the system allows successful upload of a MISP partner certificate when all mandatory and valid inputs are provided, uniqueIdentifier=TC_PMS_UploadMISPPartnerCertificate_01, additionalDependencies=TC_PMS_UploadCertificateMISPCASUBCA_03,TC_PMS_UploadCertificateMISPCASUBCA_04 |
| Messages |
| Testcase Name |
|---|
| Pms_UploadMISPPartnerCertificate_For_without_PolicyId_Valid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadMISPPartnerCertificate_For_without_PolicyId_Valid, endPoint=/v1/partnermanager/partners/certificate/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:MISPPartnerRegistration_For_Without_PolicyId_Smoke_Sid_partnerId$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertificate, outputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate MISP partner certificate upload without providing a policy ID, uniqueIdentifier=TC_PMS_UploadMISPPartnerCertificate_08, additionalDependencies=TC_PMS_UploadCertificateMISPCASUBCA_15,TC_PMS_UploadCertificateMISPCASUBCA_16 |
| Messages |
| Testcase Name |
|---|
| Pms_UploadMISPPartnerCertificate_Valid_Max_AddressField |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadMISPPartnerCertificate_Valid_Max_AddressField, endPoint=/v1/partnermanager/partners/certificate/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:MISPPartnerRegistration_Max_AddressField_sid_partnerId$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertificate, outputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate MISP partner certificate upload with the maximum allowed address field length, uniqueIdentifier=TC_PMS_UploadMISPPartnerCertificate_04, additionalDependencies=TC_PMS_UploadCertificateMISPCASUBCA_07,TC_PMS_UploadCertificateMISPCASUBCA_08 |
| Messages |
| Testcase Name |
|---|
| Pms_UploadMISPPartnerCertificate_Valid_Max_Contact_number |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadMISPPartnerCertificate_Valid_Max_Contact_number, endPoint=/v1/partnermanager/partners/certificate/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:MISPPartnerRegistration_Max_Contact_number_sid_partnerId$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertificate, outputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate MISP partner certificate upload with the maximum allowed contact number length, uniqueIdentifier=TC_PMS_UploadMISPPartnerCertificate_05, additionalDependencies=TC_PMS_UploadCertificateMISPCASUBCA_09,TC_PMS_UploadCertificateMISPCASUBCA_10 |
| Messages |
| Testcase Name |
|---|
| Pms_UploadMISPPartnerCertificate_Valid_Max_EmailID |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadMISPPartnerCertificate_Valid_Max_EmailID, endPoint=/v1/partnermanager/partners/certificate/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:MISPPartnerRegistration_Max_EmailID_sid_partnerId$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertificate, outputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate MISP partner certificate upload with the maximum allowed email ID length, uniqueIdentifier=TC_PMS_UploadMISPPartnerCertificate_06, additionalDependencies=TC_PMS_UploadCertificateMISPCASUBCA_11,TC_PMS_UploadCertificateMISPCASUBCA_12 |
| Messages |
| Testcase Name |
|---|
| Pms_UploadMISPPartnerCertificate_Valid_langcode_Arabic |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadMISPPartnerCertificate_Valid_langcode_Arabic, endPoint=/v1/partnermanager/partners/certificate/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:MISPPartnerRegistration_valid_langcode_Arabic_sid_partnerId$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertificate, outputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate MISP partner certificate upload with the language code set to Arabic, uniqueIdentifier=TC_PMS_UploadMISPPartnerCertificate_07, additionalDependencies=TC_PMS_UploadCertificateMISPCASUBCA_13,TC_PMS_UploadCertificateMISPCASUBCA_14 |
| Messages |
| Testcase Name |
|---|
| Pms_UploadMISPPartnerCertificate_valid_Empty_PolicyGroup |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadMISPPartnerCertificate_valid_Empty_PolicyGroup, endPoint=/v1/partnermanager/partners/certificate/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:MISPPartnerRegistration_Empty_PolicyGroup_sid_partnerId$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertificate, outputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error or handles appropriately when attempting to upload a MISP partner certificate with an empty policy group, uniqueIdentifier=TC_PMS_UploadMISPPartnerCertificate_02, additionalDependencies=TC_PMS_UploadCertificateMISPCASUBCA_01,TC_PMS_UploadCertificateMISPCASUBCA_02 |
| Messages |
| Testcase Name |
|---|
| Pms_UploadMISPPartnerCertificate_without_PolicyGroup_Smoke_Valid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadMISPPartnerCertificate_without_PolicyGroup_Smoke_Valid, endPoint=/v1/partnermanager/partners/certificate/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$" }, output= { }, inputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertificate, outputTemplate=pms/MISPPartnerV3/UploadMISPPartnerCertificate/UploadMISPPartnerCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate MISP partner certificate upload without a policy group, uniqueIdentifier=TC_PMS_UploadMISPPartnerCertificate_03, additionalDependencies=TC_PMS_UploadCertificateMISPCASUBCA_05,TC_PMS_UploadCertificateMISPCASUBCA_06 |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartner_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "policyGroupName": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_name$" }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API successfully links a policy group to a MISP partner with valid inputs, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartner_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_AlreadyLinked_PartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_AlreadyLinked_PartnerId_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_PRT_049" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner that is already linked, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_InValid_Request_And_Valid_PartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_InValid_Request_And_Valid_PartnerId_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "invalid-id", "version": "invalid-version", "requestTime": "invalid-request-time", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "invalid-policygroupid" }, output={ "responseCode": "400" }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner with an invalid request but a valid partner ID, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_Invalid_Id_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Invalid_Id_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "invalid-id", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner using an invalid policy group ID, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner with invalid inputs, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_Using_Auth_Partner_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Using_Auth_Partner_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_PRT_255" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner using an auth token belonging to a partner instead of an admin, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_Using_Device_Partner_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Using_Device_Partner_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_PRT_255" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner using a device token belonging to a partner instead of an admin, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_Using_FTM_Partner_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Using_FTM_Partner_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_PRT_255" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner using an FTM token belonging to a partner instead of an admin, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_Using_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Using_Invalid_RequestTime_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "2025-13-99T25:61:61Z", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "responseCode": "400" }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner using an invalid reques, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_Using_Invalid_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Using_Invalid_Version_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "invalid-version", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner using an invalid API version, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_Valid_Request_And_Invalid_PartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Valid_Request_And_Invalid_PartnerId_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "invalid-partnerid", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner with a valid request but an invalid partner ID, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_With_Empty_RequestId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_With_Empty_RequestId_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner with an empty request ID, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_With_Empty_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_With_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner with an empty request time, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_With_NULL_RequestId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_With_NULL_RequestId_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "NULL", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner with a null request ID, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_With_NULL_Version_Parameter_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_With_NULL_Version_Parameter_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "NULL", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner with a null version parameter, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_With_Version_Value_0_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_With_Version_Value_0_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner using version value 0, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_With_Version_Value_1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_With_Version_Value_1_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner using version value 1, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_Without_ObjectBody_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Without_ObjectBody_Neg, endPoint=/v1/partnermanager/pms-111557/policy-group, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartnerWithoutBody, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner without providing the request body, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_Without_Partneradmin_role_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Without_Partneradmin_role_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner without a partner admin role, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_Without_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Without_RequestTime_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "version": "1.0", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner without providing request time, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_Without_Version_Field_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Without_Version_Field_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.link.policy.group.post", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner without providing the version field, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_LinkPolicyGroupToMISPPartnerNegTC_Without_requestId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_LinkPolicyGroupToMISPPartnerNegTC_Without_requestId_Neg, endPoint=/v1/partnermanager/{partnerId}/policy-group, role=partneradmin, templateFields=null, input={ "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyGroupId": "$ID:DefinePolicyGroup_MISP_PolicyGroup_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/LinkPolicyGroupToMISPPartner/LinkPolicyGroupToMISPPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to link a policy group to a MISP partner without providing a request ID, uniqueIdentifier=TC_PMS_LinkPolicyGroupToMISPPartnerNegTC_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerExists_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_MISPPartnerExists_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "$RUNCONTEXT$newmisppartnerapiauto@gmail.com", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "partnerType": "MISP_Partner" }, output={ "partnerExists": true, "duplicateExists": false }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExistsResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API successfully confirms the existence of a MISP partner when all required valid parameters are provided as part of a smoke test, uniqueIdentifier=TC_PMS_MISPPartnerExists_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerExists_With_Email_As_string_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_MISPPartnerExists_With_Email_As_string_Neg, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "string", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "partnerType": "MISP_Partner" }, output={ "partnerExists": true, "duplicateExists": true }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExistsResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when checking MISP partner existence using an email value provided as an invalid string format, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerExists_With_Empty_PartnerType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_MISPPartnerExists_With_Empty_PartnerType_Neg, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "newmisppartnerapiauto@gmail.com", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "partnerType": "" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when checking MISP partner existence with an empty partner type, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerExists_With_Invalid_Access_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_MISPPartnerExists_With_Invalid_Access_Token_Neg, endPoint=/v1/partnermanager/partners/exists, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "newmisppartnerapiauto@gmail.com", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "partnerType": "MISP_Partner" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when checking MISP partner existence using an invalid access token, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerExists_With_Invalid_Id_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_MISPPartnerExists_With_Invalid_Id_Neg, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "invalid-id", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "newmisppartnerapiauto@gmail.com", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "partnerType": "MISP_Partner" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when checking MISP partner existence using an invalid partner ID, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerExists_With_Invalid_PartnerType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_MISPPartnerExists_With_Invalid_PartnerType_Neg, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "newmisppartnerapiauto@gmail.com", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "partnerType": "invalid-partner-type" }, output={ "errors": [ { "errorCode": "PMS_PRT_010" } ] }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when checking MISP partner existence using an invalid partner type, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerExists_With_Invalid_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_MISPPartnerExists_With_Invalid_Version_Neg, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "invalid-version", "requestTime": "$TIMESTAMP$", "emailId": "newmisppartnerapiauto@gmail.com", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "partnerType": "MISP_Partner" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when checking MISP partner existence using an invalid version value, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerExists_With_PartnerId_As_string_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_MISPPartnerExists_With_PartnerId_As_string_Neg, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "$RUNCONTEXT$newmisppartnerapiauto@gmail.com", "partnerId": "string", "partnerType": "MISP_Partner" }, output={ "partnerExists": true, "duplicateExists": true }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExistsResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when checking MISP partner existence using a partner ID provided as an invalid string format, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MISPPartnerExists_With_PartnerType_As_String_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_MISPPartnerExists_With_PartnerType_As_String_Neg, endPoint=/v1/partnermanager/partners/exists, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.partner.exists.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "emailId": "newmisppartnerapiauto@gmail.com", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "partnerType": "string" }, output={ "errors": [ { "errorCode": "PMS_PRT_010" } ] }, inputTemplate=pms/MISPPartnerV3/MISPPartnerExists/MISPPartnerExists, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when checking MISP partner existence using a partner type provided as an invalid string format, uniqueIdentifier=TC_PMS_MISPPartnerExistsNegTC_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUser_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "MISP_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API successfully retrieves the list of partners associated with the logged in user, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUser_Filter_with_AuthToken |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_Filter_with_AuthToken, endPoint=/v1/partnermanager/partners/v3, role=partnerauth, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "Auth_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API retrieves the list of partners associated with the loggedin user when a valid auth token is provided, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUser_Filter_with_DeviceToken |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_Filter_with_DeviceToken, endPoint=/v1/partnermanager/partners/v3, role=partnerdevice, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "false", "partnerType": "Device_Provider" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API retrieves the list of partners associated with the logged in user when a valid device token is provided, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUser_Filter_with_FTMToken |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_Filter_with_FTMToken, endPoint=/v1/partnermanager/partners/v3, role=partnerftm, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "false", "partnerType": "FTM_Provider" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API retrieves the list of partners associated with the logged in user when a valid FTM token is provided, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUser_only_Status |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_only_Status, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API retrieves the list of partners associated with the logged in user when only the status filter is applied, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUser_partnerType_Empty |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_partnerType_Empty, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API retrieves the list of partners associated with the logged in user when the partner type field is empty, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUser_policyGroupAvailable_Empty |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_policyGroupAvailable_Empty, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "partnerType": "MISP_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API retrieves the list of partners associated with the logged in user when the policy group field is empty, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUser_policyGroupAvailable_false |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_policyGroupAvailable_false, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "false", "partnerType": "MISP_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API retrieves the list of partners associated with the logged in user when no policy group is available, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUser_policyGroupAvailable_true |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_policyGroupAvailable_true, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "MISP_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API retrieves the list of partners associated with the logged in user when a policy group is available, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUser_status_InProgress |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUser_status_InProgress, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "InProgress", "policyGroupAvailable": "true", "partnerType": "MISP_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API retrieves the list of partners associated with the logged in user when the status filter is set to InProgress, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUser_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_InvalidStatus_validPartnerType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_InvalidStatus_validPartnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approvedInprogress", "policyGroupAvailable": "true", "partnerType": "MISP_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using an invalid status with a valid partner type, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Invalid_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Invalid_Token_Neg, endPoint=/v1/partnermanager/partners/v3, role=invalidtoken, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "MISP_Partner" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using an invalid token, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Invalid_partnerType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Invalid_partnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "MISP" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using an invalid partner type, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Invalid_query_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Invalid_query_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "FTM_Provider" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using an invalid query parameter, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Partner_Fetching_MISP_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Partner_Fetching_MISP_Neg, endPoint=/v1/partnermanager/partners/v3, role=partnerauth, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "MISP_Partner" }, output={ "errors": [ { "errorCode": "PMS_POLICY_ERROR_012" } ] }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user if MISP partner fetching fails, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Special_Characters_Status_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Special_Characters_Status_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "^%!!^!@", "policyGroupAvailable": "true", "partnerType": "MISP_Partner" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using special characters in the status filter, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Special_Characters_partnerType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_Special_Characters_partnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "^%!!^!@" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using special characters in the partner type filter, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_invalidStatus_invalidPartnerType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_invalidStatus_invalidPartnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "activedeactivate", "policyGroupAvailable": "true", "partnerType": "MISP_Partner_Auth_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using both invalid status and invalid partner type, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_lowercase_partnerType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_lowercase_partnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "misp_partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using a lowercase partner type value, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_validStatus_invalidPartnerType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListofPartnersAssociatedwithLoggedinUserNegSce_validStatus_invalidPartnerType_Neg, endPoint=/v1/partnermanager/partners/v3, role=partneradmin, templateFields=null, input={ "status": "approved", "policyGroupAvailable": "true", "partnerType": "MISP_Partner_Auth_Partner" }, output={ }, inputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUser, outputTemplate=pms/MISPPartnerV3/GetListofPartnersAssociatedwithLoggedinUser/GetListofPartnersAssociatedwithLoggedinUserResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve the list of partners associated with the logged in user using a valid status with an invalid partner type, uniqueIdentifier=TC_GetListofPartnersAssociatedwithLoggedinUsernegSce_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "$RUNCONTEXT$movp@gmail.com", "organizationName": "$RUNCONTEXT$MOVP-AUTOMATION", "partnerId": "$RUNCONTEXT$MOVP-AUTOMATION", "partnerType": "Credential_Partner", "policyGroup": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$RUNCONTEXT$MOVP-AUTOMATION", "status": "InProgress" }, inputTemplate=pms/credentialPartner/CreatePartner/createPartner, outputTemplate=pms/credentialPartner/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a credential partner successfully completes self-registration when all inputs are valid, uniqueIdentifier=TC_PMS_createCredentialPartnerSelfRegistration_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_credentialpartner_Same_Email |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_credentialpartner_Same_Email, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "$RUNCONTEXT$movp@gmail.com", "organizationName": "movp", "partnerId": "MOVP-AUTOMATION", "partnerType": "Credential_Partner", "policyGroup": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PRT_011" } ] }, inputTemplate=pms/credentialPartner/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that credential partner self-registration fails when the email address is already in use, uniqueIdentifier=TC_PMS_createCredentialPartnerSelfRegistration_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_credentialpartner_WithOut_Mandatory_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_credentialpartner_WithOut_Mandatory_Neg, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "movp@gmail.com", "organizationName": "movp", "partnerId": "$REMOVE$", "partnerType": "Credential_Partner", "policyGroup": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/credentialPartner/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that credential partner self-registration fails when mandatory input parameters are missing, uniqueIdentifier=TC_PMS_createCredentialPartnerSelfRegistration_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_withoutuploadCert_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_withoutuploadCert_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys fails when the partner has not uploaded the required certificate, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerWithoutcertupload_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_VerifyPartnersEmail_AllValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_VerifyPartnersEmail_AllValid_smoke, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "$RUNCONTEXT$mosip98763@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "emailExists": true }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that verifying a partner’s email with all valid inputs is successful, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_VerifyPartnersEmail_Device_Provider_AllValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_VerifyPartnersEmail_Device_Provider_AllValid_smoke, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "$RUNCONTEXT$mosip98763@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "emailExists": true }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that verifying a Device Provider partners email with all valid inputs is successful, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_VerifyPartnersEmail_Ftm_Provider_AllValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_VerifyPartnersEmail_Ftm_Provider_AllValid_smoke, endPoint=/v1/partnermanager/partners/email/verify, role=partnerftm, templateFields=null, input={ "emailId": "$RUNCONTEXT$mosip98788@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "emailExists": true }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that verifying an FTM Provider partners email with all valid inputs is successful, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_VerifyPartnersEmail_invalid_email_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_VerifyPartnersEmail_invalid_email_neg, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "gfhgytth", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_012" } ] }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that verifying a partners email fails when an invalid email is provided, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_VerifyPartnersEmail_missing_email_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_VerifyPartnersEmail_missing_email_neg, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_012" } ] }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that verifying a partner’s email fails when the email parameter is missing, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_VerifyPartnersEmail_without_auth_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_VerifyPartnersEmail_without_auth_neg, endPoint=/v1/partnermanager/partners/email/verify, role=invalidtoken, templateFields=null, input={ "emailId": "mosip98763@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that verifying a partners email fails when authentication is not provided, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerExpiringCertificateBeforeCertificateUpload_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerExpiringCertificateBeforeCertificateUpload_Neg, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ "expiryPeriod": "30" }, output={ "isCertificateAvailable": false }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateBeforeCertificateUpload, outputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateBeforeCertificateUploadResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that no expiring partner certificates are returned if certificates have not been uploaded yet, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$CACERT$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "AUTH" }, output= { "status": "Upload Success." }, inputTemplate=pms/UploadCACertificate/uploadCertificate, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a CA Certificate with all valid inputs is successful and reflected correctly, uniqueIdentifier=TC_PMS_UploadCACertificate_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_UploadAgain_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_UploadAgain_Neg, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$CACERT$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "AUTH" }, output= { "errors": [ { "errorCode": "KER-PCM-003" } ] }, inputTemplate=pms/UploadCACertificate/uploadCertificate, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that re-uploading an already uploaded CA Certificate fails, uniqueIdentifier=TC_PMS_UploadCACertificate_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_with_blank_data |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_with_blank_data, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "", "partnerId": "$REMOVE$", "partnerDomain": "AUTH" }, output= { "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UploadCACertificate/uploadCertificate, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a CA Certificate fails when the input data is blank, uniqueIdentifier=TC_PMS_UploadCACertificate_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_with_invalid_data |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_with_invalid_data, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "dgdhshj@hhdeege", "partnerId": "$REMOVE$", "partnerDomain": "AUTH" }, output= { "errors": [ { "errorCode": "KER-CRY-003" } ] }, inputTemplate=pms/UploadCACertificate/uploadCertificate, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=KER-CRY-003,KER-KMS-013, kycFields=null, description=Validate that uploading a CA Certificate fails when invalid data is provided, uniqueIdentifier=TC_PMS_UploadCACertificate_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCertificateDeviceProvider_with_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCertificateDeviceProvider_with_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$CACERT$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "DEVICE" }, output= { "status": "Upload Success." }, inputTemplate=pms/UploadCACertificate/uploadCertificate, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a Device Provider Certificate with all valid inputs is successful and reflected correctly, uniqueIdentifier=TC_PMS_UploadCACertificate_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCertificate_Ftm_Provider_with_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCertificate_Ftm_Provider_with_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$CACERT$", "partnerId": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "FTM" }, output= { "status": "Upload Success." }, inputTemplate=pms/UploadCACertificate/uploadCertificate, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a Certificate for an FTM Provider with all valid inputs is successful, uniqueIdentifier=TC_PMS_UploadCACertificate_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadSubCACertificate_DeviceProvider_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadSubCACertificate_DeviceProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$INTERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "DEVICE" }, output= { "status": "Upload Success." }, inputTemplate=pms/UploadCACertificate/uploadCertificate, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a Sub CA Certificate for a Device Provider with all valid inputs is successful, uniqueIdentifier=TC_PMS_UploadCACertificate_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadSubCACertificate_Ftm_Provider_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadSubCACertificate_Ftm_Provider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$INTERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "FTM" }, output= { "status": "Upload Success." }, inputTemplate=pms/UploadCACertificate/uploadCertificate, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a Sub CA Certificate for an FTM Provider with all valid inputs is successful, uniqueIdentifier=TC_PMS_UploadCACertificate_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadSubCACertificate_with_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadSubCACertificate_with_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$INTERCERT$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "AUTH" }, output= { "status": "Upload Success." }, inputTemplate=pms/UploadCACertificate/uploadCertificate, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a Sub CA Certificate with all valid inputs is successful and reflected correctly, uniqueIdentifier=TC_PMS_UploadCACertificate_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllCertificate_BeforeCACertificates_upload_neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllCertificate_BeforeCACertificates_upload_neg, endPoint=/v1/partnermanager/partners/trust-chain-certificates?pageNo=0&pageSize=8&issuedTo=PMS_API_CA&issuedBy=PMS_API_CA, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving certificates fails when the CA certificates have not been uploaded, uniqueIdentifier=TC_PMS_GetAllCertificateBeforeCACertificateUpload_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_before_certificate_upload |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_before_certificate_upload, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$" }, output={ "errors": [ { "errorCode": "PMS_PRT_108" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that no partner certificates are returned if the certificates have not been uploaded yet, uniqueIdentifier=TC_PMS_getPartner_certificate_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadPartnerCert_All_Valid_Smoke_Sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_UploadPartnerCert_All_Valid_Smoke_Sid, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "AUTH" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCert, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a Partner Certificate with all valid inputs including sid is successful, uniqueIdentifier=TC_PMS_uploadPartnerCert_01, additionalDependencies=TC_PMS_UploadCACertificate_01, TC_PMS_UploadCACertificate_02 |
| Messages |
| Testcase Name |
|---|
| Pms_UploadPartnerCert_UploadAgain_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_UploadPartnerCert_UploadAgain_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "AUTH" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCert, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a Partner Certificate again fails when the certificate already exists, uniqueIdentifier=TC_PMS_uploadPartnerCert_07, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01,TC_PMS_UploadCACertificate_01, TC_PMS_UploadCACertificate_02 |
| Messages |
| Testcase Name |
|---|
| Pms_UploadPartnerCert_invalid_Domain_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_UploadPartnerCert_invalid_Domain_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "dht" }, output= { "errors": [ { "errorCode": "KER-PCM-011" } ] }, inputTemplate=pms/UploadPartnerCert/uploadCert, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a Partner Certificate fails when an invalid domain is provided, uniqueIdentifier=TC_PMS_uploadPartnerCert_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadPartnerCert_invalid_certificate_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_UploadPartnerCert_invalid_certificate_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "hgftywqgtftfqgd", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "AUTH" }, output= { "errors": [ { "errorCode": "KER-KMS-013" } ] }, inputTemplate=pms/UploadPartnerCert/uploadCert, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a Partner Certificate fails when an invalid certificate is provided, uniqueIdentifier=TC_PMS_uploadPartnerCert_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadPartnerCert_missing_PartnerDomain_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_UploadPartnerCert_missing_PartnerDomain_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "$REMOVE$" }, output= { "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UploadPartnerCert/uploadCert, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a Partner Certificate fails when the Partner Domain is missing, uniqueIdentifier=TC_PMS_uploadPartnerCert_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadPartnerCert_uploadCertificateDeviceProvider_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_UploadPartnerCert_uploadCertificateDeviceProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "DEVICE" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCert, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a Partner Certificate and Device Provider Certificate with all valid inputs is successful, uniqueIdentifier=TC_PMS_uploadPartnerCert_03, additionalDependencies=TC_PMS_UploadCACertificate_03, TC_PMS_UploadCACertificate_04 |
| Messages |
| Testcase Name |
|---|
| Pms_UploadPartnerCert_uploadCertificateFtmProvider_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_UploadPartnerCert_uploadCertificateFtmProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerftm, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "FTM" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCert, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a Partner Certificate and FTM Provider Certificate with all valid inputs is successful, uniqueIdentifier=TC_PMS_uploadPartnerCert_08, additionalDependencies=TC_PMS_createPartnerSelfRegistration_07,TC_PMS_UploadCACertificate_05, TC_PMS_UploadCACertificate_06 |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerCert_AuthPartner_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerCert_AuthPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$" }, output= { }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all partner certificates are successfully retrieved for an authenticated partner with valid inputs, uniqueIdentifier=TC_PMS_GetPartnerCert_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerCert_DeviceProvider_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerCert_DeviceProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerdevice, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$" }, output= { }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all partner certificates are successfully retrieved for a device provider with valid inputs, uniqueIdentifier=TC_PMS_GetPartnerCert_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerCert_FtmProvider_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerCert_FtmProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerftm, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$" }, output= { }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get partner certificate succeeds for FTM providerValidate that all partner certificates are successfully retrieved for an FTM provider with valid inputs, uniqueIdentifier=TC_PMS_GetPartnerCert_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerCert_with_unregistered_partner_neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerCert_with_unregistered_partner_neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerauth, templateFields=null, input={ "partnerId": "848484848" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner certificate retrieval fails when requested for an unregistered partner, uniqueIdentifier=TC_PMS_GetPartnerCert_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllCertificate_Device_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllCertificate_Device_allValid_smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ }, output={ "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/GetAllCertificate/getAllCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all device certificates are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetAllCertificate_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllCertificate_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllCertificate_allValid_smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerauth, templateFields=null, input={ }, output={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "partnerType": "Auth_Partner", "isCertificateAvailable": true }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/GetAllCertificate/getAllCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all certificates are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetAllCertificate_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllCertificate_invalid_auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllCertificate_invalid_auth, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving certificates fails when an invalid authentication is provided, uniqueIdentifier=TC_PMS_GetAllCertificate_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllCertificate_without_auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllCertificate_without_auth, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving certificates fails when authentication is not provided, uniqueIdentifier=TC_PMS_GetAllCertificate_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePartnerDetails_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePartnerDetails_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "address": "Bangalore Ind", "contactNumber": "8553967576", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "status": "approved" }, inputTemplate=pms/UpdatePartner/updatePartner, outputTemplate=pms/UpdatePartner/updatePartnerResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating Partner details with all valid inputs is successful and the changes are reflected correctly, uniqueIdentifier=TC_PMS_updatePartnerDetails_01, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePartnerDetails_Missing_InputParameter_Address |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePartnerDetails_Missing_InputParameter_Address, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "Tech-123", "address": "$REMOVE$", "contactNumber": "8553967576", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UpdatePartner/updatePartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating Partner details fails when the address parameter is missing, uniqueIdentifier=TC_PMS_updatePartnerDetails_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePartnerDetails_Missing_InputParameter_contactNumber |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePartnerDetails_Missing_InputParameter_contactNumber, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "Tech-123", "address": "Bangalore Ind", "contactNumber": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UpdatePartner/updatePartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating Partner details fails when the contactNumber parameter is missing, uniqueIdentifier=TC_PMS_updatePartnerDetails_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePartnerDetails_invalid_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePartnerDetails_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "Tech-1231234", "address": "Bangalore Ind", "contactNumber": "8553967576", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/UpdatePartner/updatePartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating Partner details fails when an invalid partnerId is provided, uniqueIdentifier=TC_PMS_updatePartnerDetails_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$CACERT$", "partnerId": "$ID:PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/credentialPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/credentialPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that CA certificates are successfully uploaded when all inputs are valid, uniqueIdentifier=TC_PMS_uploadCredentialPartnerCACert_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_with_invalid_certs_data |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_with_invalid_certs_data, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "dgdhshj@hhdeege", "partnerId": "$ID:PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid_partnerId$" }, output= { "errors": [ { "errorCode": "KER-CRY-003" } ] }, inputTemplate=pms/credentialPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=KER-CRY-003,KER-KMS-013, kycFields=null, description=Validate that CA certificate upload fails when invalid certificate data is provided, uniqueIdentifier=TC_PMS_uploadCredentialPartnerCACert_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadSUBCACertificate_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadSUBCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$INTERCERT$", "partnerId": "$ID:PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/credentialPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/credentialPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that Sub CA certificates are successfully uploaded when all inputs are valid, uniqueIdentifier=TC_PMS_uploadCredentialPartnerSubcaCert_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCert_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$PARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid_partnerId$" }, output= { }, inputTemplate=pms/credentialPartner/UploadCert/uploadCert, outputTemplate=pms/credentialPartner/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that certificates are successfully uploaded when all inputs are valid, uniqueIdentifier=TC_PMS_uploadCredentialPartnerCert_01, additionalDependencies=TC_PMS_uploadCert_01,TC_PMS_uploadCert_03 |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartner_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid_partnerId$" }, output= { "partnerID": "$ID:PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid_partnerId$", "errors": "[]" }, inputTemplate=pms/credentialPartner/GetPartner/getPartner, outputTemplate=pms/credentialPartner/GetPartner/getPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all partner details are successfully retrieved when valid inputs are provided, uniqueIdentifier=TC_PMS_getOnlineVerificationPartner_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartner_invalid_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartner_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "abcd_dxxxxxyz" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/credentialPartner/GetPartner/getPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving partner details fails when an invalid partner ID is provided, uniqueIdentifier=TC_PMS_getOnlineVerificationPartner_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerCert_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid_partnerId$" }, output= { }, inputTemplate=pms/credentialPartner/GetCertificate/getCert, outputTemplate=pms/credentialPartner/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner certificates are retrieved successfully when all inputs are valid, uniqueIdentifier=TC_PMS_getOnlineVerificationPartnerCert_01, additionalDependencies=TC_PMS_uploadcredentialPartnerCert_01 |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApprovedAuthPartnerId_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApprovedAuthPartnerId_allValid_smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=partnerauth, templateFields=null, input={ }, output={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$" }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerIdResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all approved authenticated partner IDs are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerId_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApprovedAuthPartnerId_invalid_auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApprovedAuthPartnerId_invalid_auth, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving approved authenticated partner IDs fails when an invalid authentication is provided, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerId_02_neg, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApprovedAuthPartnerId_without_auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApprovedAuthPartnerId_without_auth, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving approved authenticated partner IDs fails when authentication is not provided, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerId_01_neg, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_BeforePolicyMapping_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_BeforePolicyMapping_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys for a partner fails when no policy has been mapped yet, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerBeforePolicyMapping_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllRequestedPolicies_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllRequestedPolicies_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all requested policies are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_AddContact_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_AddContact_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/contact/add, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "address": "Bangalore", "contactNumber": "9903255448", "emailId": "$RUNCONTEXT$print@email.com", "is_Active": true, "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/authPartner/AddContacts/addContactResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a new contact can be added successfully when all required inputs are provided and valid, uniqueIdentifier=TC_PMS_AddContact_01, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_AddContact_Missing_InputParameter_address |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_AddContact_Missing_InputParameter_address, endPoint=/v1/partnermanager/partners/{partnerId}/contact/add, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "address": "$REMOVE$", "contactNumber": "9903255448", "emailId": "print@email.com", "is_Active": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.address" } ] }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that adding a contact fails when the address input parameter is missing, uniqueIdentifier=TC_PMS_AddContact_02, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_AddContact_Missing_InputParameter_contactNumber |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_AddContact_Missing_InputParameter_contactNumber, endPoint=/v1/partnermanager/partners/{partnerId}/contact/add, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "address": "Bangalore", "contactNumber": "$REMOVE$", "emailId": "print@email.com", "is_Active": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that adding a contact fails when the contact number input parameter is missing, uniqueIdentifier=TC_PMS_AddContact_03, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_AddContact_Missing_InputParameter_emailId |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_AddContact_Missing_InputParameter_emailId, endPoint=/v1/partnermanager/partners/{partnerId}/contact/add, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "address": "Bangalore", "contactNumber": "9903255448", "emailId": "$REMOVE$", "is_Active": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that adding a contact fails when the email ID input parameter is missing, uniqueIdentifier=TC_PMS_AddContact_04, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_CredPartnerApiKeyRequest_With_Invalid_policyName_useCaseDescription_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_CredPartnerApiKeyRequest_With_Invalid_policyName_useCaseDescription_neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/map, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid_partnerId$", "policyName": "mosip@8474748", "useCaseDescription": "mosi182736@636", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that creating a partner API key request fails when both the policy name and use case description are invalid, uniqueIdentifier=TC_PMS_RequestAPIKeyCredentialPartner_06, additionalDependencies=TC_PMS_createCredentialPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_CredPartnerApiKeyRequest_With_Invalid_useCaseDescription_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_CredPartnerApiKeyRequest_With_Invalid_useCaseDescription_neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/map, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid_partnerId$", "policyName": "mosip@8474748", "useCaseDescription": "mosip data share policy", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that creating a partner API key request fails when an invalid use case description is provided, uniqueIdentifier=TC_PMS_RequestAPIKeyCredentialPartner_05, additionalDependencies=TC_PMS_createCredentialPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_SubmitPartnerApiKeyRequest_Approval_All_for_Deactivated_policy |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_SubmitPartnerApiKeyRequest_Approval_All_for_Deactivated_policy, endPoint=/v1/partnermanager/partners/{partnerId}/policy/map, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_for_Get_ApiKey_With_Deactive_Partner_sid_partnerId$", "policyName": "$ID:DefineDataSharePolicy_All_for_req_ApiKey_sid_name$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_016" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner API key request approval fails when the associated policy is deactivated, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_03, additionalDependencies=TC_PMS_createPartnerSelfRegistration_10 |
| Messages |
| Testcase Name |
|---|
| Pms_SubmitPartnerApiKeyRequest_Map_partner_partner_inprogress_state_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_SubmitPartnerApiKeyRequest_Map_partner_partner_inprogress_state_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/map, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyName": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_name$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_053" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that submitting a partner API key request fails when the partner mapping is in an in progress state, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_04, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/{partnerId}/policy/map, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid_partnerId$", "policyName": "$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_name$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner API key requests can be submitted and rejected successfully for all valid entries, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_01, additionalDependencies=TC_PMS_createCredentialPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_partnerPolicyMapping_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_partnerPolicyMapping_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/{partnerId}/policy/map, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyName": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_name$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy mappings are retrieved successfully for all valid entries, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_05, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_partnerPolicyMapping_ForDeactivateOIDCNeg_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_partnerPolicyMapping_ForDeactivateOIDCNeg_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/{partnerId}/policy/map, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyName": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_name$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner-policy mappings are retrieved successfully for all valid entries in scenarios related to OIDC client deactivation, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_02, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_partnerPolicyMapping_ForPending_All_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_partnerPolicyMapping_ForPending_All_Valid_sid, endPoint=/v1/partnermanager/partners/{partnerId}/policy/map, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyName": "$ID:DefinePolicy_All_Valid_For_InProgressMapping_Policy_pms_sid_name$", "useCaseDescription": "Need to submit for Pending", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy mappings in a pending state are listed correctly for all valid entries, uniqueIdentifier=TC_PMS_RequestAPIKeyauthPartner_12, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_partnerPolicyMapping_ForRejecting_All_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_partnerPolicyMapping_ForRejecting_All_Valid_sid, endPoint=/v1/partnermanager/partners/{partnerId}/policy/map, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyName": "$ID:DefinePolicy_All_Valid_For_Reject_Policy_pms_sid_name$", "useCaseDescription": "Need to submit for Rejecting", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all valid partner-policy mappings are accessible and correctly listed during API key rejection processes, uniqueIdentifier=TC_PMS_RequestAPIKeyauthPartner_11, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_partnerPolicyMapping_For_MISP_Policy_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_partnerPolicyMapping_For_MISP_Policy_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/{partnerId}/policy/map, role=partneradmin, templateFields=null, input={ "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "requesttime": "$TIMESTAMP$", "policyName": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_name$", "useCaseDescription": "Liking the Partner and the Policy" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner-policy mappings are retrieved successfully for all valid MISPs, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_06, additionalDependencies=TC_PMS_CreateMISPPartnerRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_partnerPolicyMapping_invalid_partnerId_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_partnerPolicyMapping_invalid_partnerId_neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/map, role=partnerauth, templateFields=null, input={ "partnerId": "1hhggg9", "policyName": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_name$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving partner-policy mappings fails when an invalid partner ID is provided, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_partnerPolicyMapping_invalid_policyName_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_partnerPolicyMapping_invalid_policyName_neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/map, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyName": "%^776hfgsdf", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving partner-policy mappings fails when an invalid policy name is provided, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_07, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_partnerPolicyMapping_missing_policyName_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_partnerPolicyMapping_missing_policyName_neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/map, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyName": "$REMOVE$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving partner-policy mappings fails when the policy name is missing, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_09, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_partnerPolicyMapping_missing_useCaseDescription_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_partnerPolicyMapping_missing_useCaseDescription_neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/map, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyName": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_name$", "useCaseDescription":"$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving partner-policy mappings fails when the use case description is missing, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_10, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_AddBioExtractors_MosipDataSharePolicy_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_AddBioExtractors_MosipDataSharePolicy_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId":"$ID:PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid_partnerId$", "policyId":"$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output=null, inputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractors, outputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractorsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that bio extractors can be successfully added under the Mosip Data Share policy when all inputs are valid, uniqueIdentifier=TC_PMS_addBioExtractors_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_AddBioExtractors_MosipPolicy_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_AddBioExtractors_MosipPolicy_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId":"$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyId":"$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output=null, inputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractors, outputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractorsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that bio extractors can be successfully added under the Mosip policy when all inputs are valid, uniqueIdentifier=TC_PMS_addBioExtractors_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_AddBioExtractors_invalid_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_AddBioExtractors_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId":"abcd", "policyId":"$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_061" } ] }, inputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractors, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that adding bio extractors fails when an invalid partner ID is provided, uniqueIdentifier=TC_PMS_addBioExtractors_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_AddBioExtractors_invalid_policyId |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_AddBioExtractors_invalid_policyId, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId":"$ID:PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid_partnerId$", "policyId":"abcd", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_061" } ] }, inputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractors, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that adding bio extractors fails when an invalid policy ID is provided, uniqueIdentifier=TC_PMS_addBioExtractors_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingKey_Missing_InputParameter_status |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RejectMappingKey_Missing_InputParameter_status, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "$REMOVE$", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/authPartner/RejectMappingKey/RejectMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that mapping key rejection fails when the status input parameter is missing, uniqueIdentifier=TC_PMS_RejectAPIKey_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingKey_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ApproveMappingKey_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a mapping key is successfully approved when all input parameters are valid, uniqueIdentifier=TC_PMS_ApproveAPIKey_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingKey_ForDeactivateOIDCNeg_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ApproveMappingKey_ForDeactivateOIDCNeg_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_ForDeactivateOIDCNeg_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a mapping key can be approved successfully even when the associated OIDC client is deactivated, using valid inputs, uniqueIdentifier=TC_PMS_ApproveAPIKey_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingKey_For_MISP_Policy_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ApproveMappingKey_For_MISP_Policy_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_For_MISP_Policy_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a mapping key is successfully approved for a MISP policy when all inputs are valid, uniqueIdentifier=TC_PMS_ApproveAPIKey_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingKey_Map_partner_toalready_mapped_policy_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ApproveMappingKey_Map_partner_toalready_mapped_policy_neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PM_034" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that mapping key approval fails when attempting to map a partner to a policy that is already mapped, uniqueIdentifier=TC_PMS_ApproveAPIKey_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingKey_Missing_Request_Time_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ApproveMappingKey_Missing_Request_Time_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that mapping key approval fails when the request time is missing, uniqueIdentifier=TC_PMS_ApproveAPIKey_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingKey_Missing_status_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ApproveMappingKey_Missing_status_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$", "status": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that mapping key approval fails when the status field is missing, uniqueIdentifier=TC_PMS_ApproveAPIKey_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingKey_PastDate_Request_Time_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ApproveMappingKey_PastDate_Request_Time_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that mapping key approval fails when the request time is set to a past date, uniqueIdentifier=TC_PMS_ApproveAPIKey_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingKey_Reject_All_Valid |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ApproveMappingKey_Reject_All_Valid, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Rejected", "mappingkey": "$ID:partnerPolicyMapping_ForRejecting_All_Valid_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping rejected successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a mapping key is successfully rejected when all input parameters are valid, uniqueIdentifier=TC_PMS_ApproveAPIKey_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingKey_Rejected_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ApproveMappingKey_Rejected_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a mapping key with rejected status is successfully approved when all inputs are valid, uniqueIdentifier=TC_PMS_ApproveAPIKey_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingKey_SpaceIn_mapping_key_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ApproveMappingKey_SpaceIn_mapping_key_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "requesttime": "$TIMESTAMP$", "mappingkey": " " }, output={ "errors": [ { "errorCode": "PMS_PMP_007" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that mapping key approval fails when the mapping key contains spaces, uniqueIdentifier=TC_PMS_ApproveAPIKey_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllRequestedPolicies_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllRequestedPolicies_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all requested policies are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllRequestedPolicies_invalid_auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllRequestedPolicies_invalid_auth, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that requested policies retrieval fails when an invalid or expired authentication token is used, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllRequestedPolicies_without_auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllRequestedPolicies_without_auth, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that requested policies retrieval fails when no authentication is provided, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApprovedAuthPartnerPolicy_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApprovedAuthPartnerPolicy_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=partnerauth, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy, outputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all approved policies for an authenticated partner are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerPolicy_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApprovedAuthPartnerPolicy_invalid_auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApprovedAuthPartnerPolicy_invalid_auth, endPoint=/v1/partnermanager/partners/auth-partners-policies, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving all approved policies for a partner fails when an invalid authentication is provided, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerPolicy_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApprovedAuthPartnerPolicy_without_auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApprovedAuthPartnerPolicy_without_auth, endPoint=/v1/partnermanager/partners/auth-partners-policies, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving all approved policies for a partner fails when authentication is not provided, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerPolicy_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_BeforeApiKeyGenerated_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_BeforeApiKeyGenerated_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys for a partner fails when no API key has been generated yet, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerBeforeApiKeyGenerated_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateApiKey_AllValid_smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBodyForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateApiKey_AllValid_smoke_sid, endPoint=/v1/partnermanager/partners/{partnerId}/generate/apikey, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyName": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_name$", "label": "pmsAutomation", "requesttime": "$TIMESTAMP$" }, output={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "label": "pmsAutomation" }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/GenerateApiKey/generateApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that an API key is successfully generated with all valid inputs, uniqueIdentifier=TC_PMS_GenerateApikey_01, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateApiKey_InValid_policy_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBodyForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateApiKey_InValid_policy_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/generate/apikey, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyName": "dfbgafb", "label": "pmsAutomation", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_014", "message": "Policy does not exist" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key generation fails when an invalid policy is provided, uniqueIdentifier=TC_PMS_GenerateApikey_07, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateApiKey_Missing_Request_time_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBodyForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateApiKey_Missing_Request_time_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/generate/apikey, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyName": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_name$", "label": "pmsAutomation" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key generation fails when the requestTime parameter is missing, uniqueIdentifier=TC_PMS_GenerateApikey_03, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateApiKey_Missing_label_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBodyForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateApiKey_Missing_label_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/generate/apikey, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyName": "mosip policy 192341", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key generation fails when the label parameter is missing, uniqueIdentifier=TC_PMS_GenerateApikey_05, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateApiKey_Missing_policyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBodyForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateApiKey_Missing_policyName_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/generate/apikey, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "label": "pmsAutomation", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key generation fails when the policyName parameter is missing, uniqueIdentifier=TC_PMS_GenerateApikey_06, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateApiKey_PastDate_Request_time_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBodyForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateApiKey_PastDate_Request_time_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/generate/apikey, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyName": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_name$", "label": "pmsAutomation", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate API key generation fails when requestTime is missing, uniqueIdentifier=TC_PMS_GenerateApikey_04, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateApiKey_Regenerate_Same_Key_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBodyForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateApiKey_Regenerate_Same_Key_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/generate/apikey, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyName": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_name$", "label": "pmsAutomation", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_110" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that regenerating an API key fails when the same key already exists, uniqueIdentifier=TC_PMS_GenerateApikey_02, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBodyForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid, endPoint=/v1/partnermanager/partners/{partnerId}/generate/apikey, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyName": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_name$", "label": "pmsAutomation-19234", "requesttime": "$TIMESTAMP$" }, output={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "label": "pmsAutomation-19234" }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/GenerateApiKey/generateApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully generated for all approved policies with valid inputs, uniqueIdentifier=TC_PMS_GenerateApikey_08, additionalDependencies=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Name |
|---|
| Partner_ActivateDeactivatePartnerApiKey_Lable_Removed_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Partner_ActivateDeactivatePartnerApiKey_Lable_Removed_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "partner-111997", "policyId": "$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "label": "$REMOVE$", "requesttime": "$TIMESTAMP$", "status": "Active" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key activation or deactivation fails when the label is removed or missing, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_ActivateDeactivatePartnerApiKey_activate_Dublicate_Lable_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Partner_ActivateDeactivatePartnerApiKey_activate_Dublicate_Lable_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "partner-111997", "policyId": "MDSPK", "label": "pmsAutomation", "requesttime": "$TIMESTAMP$", "status": "Active" }, output={ "errors": [ { "errorCode": "PMS_PRT_111" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key activation fails when attempting to activate using a duplicate label, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_ActivateDeactivatePartnerApiKey_invalid_label |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Partner_ActivateDeactivatePartnerApiKey_invalid_label, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "partner-111997", "policyId": "$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "label": "asdfsad", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "errors": [ { "errorCode": "PMS_PRT_111" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key activation or deactivation fails when an invalid label is provided, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ActivateDeactivatePartnerApiKey_activate_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_activate_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "label": "pmsAutomation", "requesttime": "$TIMESTAMP$", "status": "Active" }, output={ "response": "Partner apikey activated successfully." }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner activation or deactivation fails when an invalid partner ID is provided, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ActivateDeactivatePartnerApiKey_deactivate_InValid_APIKey_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_deactivate_InValid_APIKey_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_for_Get_ApiKey_With_Deactive_Partner_sid_partnerId$", "policyId": "policyid", "label": "pmsAutomation", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "errors": [ { "errorCode": "PMS_PRT_111" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key deactivation fails when an invalid API key is provided, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ActivateDeactivatePartnerApiKey_deactivate_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_deactivate_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "label": "pmsAutomation", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "response": "Partner apikey deactivated successfully." }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that an active API key is successfully deactivated when a valid deactivate request is submitted, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ActivateDeactivatePartnerApiKey_invalid_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "asdfgrwg", "policyId": "$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "label": "pmsAutomation", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "errors": [ { "errorCode": "PMS_PRT_111" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key activation or deactivation fails when an invalid partner ID is provided, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ActivateDeactivatePartnerApiKey_invalid_policyId |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_invalid_policyId, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "partner-111997", "policyId": "asfv", "label": "pmsAutomation", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "errors": [ { "errorCode": "PMS_PRT_111" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key activation or deactivation fails when an invalid policy ID is provided, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ActivatePartnerApiKey_ValidActivateRequest_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ActivatePartnerApiKey_ValidActivateRequest_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "label": "pmsAutomation", "requesttime": "$TIMESTAMP$", "status": "Active" }, output={ "response": "Partner apikey activated successfully." }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that an inactive API key is successfully activated when a valid activate request is submitted, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| PMS_InsertDBData_For_API_Key_10_days |
| Testcase Dependency |
| [] |
| Class Name |
| DBIntegration |
| Testcase Input |
| testCaseName=PMS_InsertDBData_For_API_Key_10_days, endPoint=no endpoint, role=partnerauth, templateFields=null, input={ "partner_id": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policy_id": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/InsertAPIKeyData10daysAPIKey, outputTemplate=pms/InsertDBData/InsertAPIKeyDataResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key data is inserted into the database with an expiry set 10 days from the creation date, uniqueIdentifier=TC_DBDependent_InsertQuery_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| PMS_InsertDBData_For_API_Key_15_days |
| Testcase Dependency |
| [] |
| Class Name |
| DBIntegration |
| Testcase Input |
| testCaseName=PMS_InsertDBData_For_API_Key_15_days, endPoint=no endpoint, role=partnerauth, templateFields=null, input={ "partner_id": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policy_id": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/InsertAPIKeyData15daysAPIKey, outputTemplate=pms/InsertDBData/InsertAPIKeyDataResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key data is inserted into the database with an expiry set 15 days from the creation date, uniqueIdentifier=TC_DBDependent_InsertQuery_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| PMS_InsertDBData_For_API_Key_Valid_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| DBIntegration |
| Testcase Input |
| testCaseName=PMS_InsertDBData_For_API_Key_Valid_smoke_Pos, endPoint=no endpoint, role=partnerauth, templateFields=null, input={ "partner_id": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policy_id": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/InsertAPIKeyData, outputTemplate=pms/InsertDBData/InsertAPIKeyDataResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key data is inserted successfully into the database when a valid request is submitted, uniqueIdentifier=TC_DBDependent_InsertQuery_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all API keys are successfully retrieved for an authenticated partner with valid inputs, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_invalid_auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_invalid_auth, endPoint=/v1/partnermanager/partner-api-keys/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys for a partner fails when an invalid authentication is provided, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_without_auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_without_auth, endPoint=/v1/partnermanager/partner-api-keys/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys for a partner fails when authentication is not provided, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all API keys are successfully retrieved for an authenticated partner with valid inputs, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_invalid_auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_invalid_auth, endPoint=/v1/partnermanager/partner-api-keys/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys for a partner fails when an invalid authentication is provided, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_without_auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_without_auth, endPoint=/v1/partnermanager/partner-api-keys/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys for a partner fails when authentication is not provided, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all partner policy requests are successfully retrieved when a valid request is made, uniqueIdentifier=TC_PMS_partner-policy-requests_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_With_policyId_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_With_policyId_given, endPoint=/v1/partnermanager/partner-policy-requests?policyId={policyId}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "2", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests are successfully retrieved when filtered by a valid policyId, uniqueIdentifier=TC_PMS_partner-policy-requests_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_with_combination_search_twofields |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_combination_search_twofields, endPoint=/v1/partnermanager/partner-policy-requests?partnerId={partnerId}&requestDetails={requestDetails}, role=partnerauth, templateFields=null, input={ "partnerId": "1", "requestDetails": "2", "status": "$REMOVE$", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests are successfully retrieved when filtered using a combination, uniqueIdentifier=TC_PMS_partner-policy-requests_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_with_orgname_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_orgname_given, endPoint=/v1/partnermanager/partner-policy-requests?orgName={orgName}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "1", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests are successfully retrieved when filtered by a valid orgName, uniqueIdentifier=TC_PMS_partner-policy-requests_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_with_pageNo_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_pageNo_given, endPoint=/v1/partnermanager/partner-policy-requests?pageNo={pageNo}&pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "pageNo": "8", "status": "$REMOVE$", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageSize": "5", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests are successfully retrieved when a specific page number is provided, uniqueIdentifier=TC_PMS_partner-policy-requests_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_with_partnerId_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_partnerId_given, endPoint=/v1/partnermanager/partner-policy-requests?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "partnerId": "a", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests are successfully retrieved when filtered by a valid partnerId, uniqueIdentifier=TC_PMS_partner-policy-requests_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_with_partnerType_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_partnerType_given, endPoint=/v1/partnermanager/partner-policy-requests?partnerType={partnerType}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "a" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests are successfully retrieved when filtered by a valid partnerType, uniqueIdentifier=TC_PMS_partner-policy-requests_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_with_policygroupname_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_policygroupname_given, endPoint=/v1/partnermanager/partner-policy-requests?policyGroupName={policyGroupName}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "Group", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests are successfully retrieved when filtered by a valid policyGroupName, uniqueIdentifier=TC_PMS_partner-policy-requests_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_with_policyname_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_policyname_given, endPoint=/v1/partnermanager/partner-policy-requests?policyName={policyName}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "policy", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests are successfully retrieved when filtered by a valid policyName, uniqueIdentifier=TC_PMS_partner-policy-requests_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_with_random_value_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_random_value_given, endPoint=/v1/partnermanager/partner-policy-requests?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "status": "$REMOVE$", "partnerId": "&&&abcdf", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests retrieval fails or returns no data when filtered with an random value, uniqueIdentifier=TC_PMS_partner-policy-requests_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_with_requestDetails_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_requestDetails_given, endPoint=/v1/partnermanager/partner-policy-requests?requestDetails={requestDetails}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "ab", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests are successfully retrieved when filtered by requestDetails, uniqueIdentifier=TC_PMS_partner-policy-requests_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_with_sortType_ASC |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_sortType_ASC, endPoint=/v1/partnermanager/partner-policy-requests?sortType={sortType}, role=partnerauth, templateFields=null, input={ "sortType": "ASC", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests are successfully retrieved in ascending order when sorted by a valid sortType, uniqueIdentifier=TC_PMS_partner-policy-requests_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_with_sortType_DESC |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_sortType_DESC, endPoint=/v1/partnermanager/partner-policy-requests?sortType={sortType}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "DESC", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests are successfully retrieved in descending order when sorted by a valid sortType, uniqueIdentifier=TC_PMS_partner-policy-requests_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_with_status_Inprogress |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_status_Inprogress, endPoint=/v1/partnermanager/partner-policy-requests?status={status}, role=partnerauth, templateFields=null, input={ "status": "InProgress", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests with status Inprogress are successfully retrieved, uniqueIdentifier=TC_PMS_partner-policy-requests_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_with_status_approved |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_status_approved, endPoint=/v1/partnermanager/partner-policy-requests?status={status}, role=partnerauth, templateFields=null, input={ "status": "approved", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests with status Approved are successfully retrieved, uniqueIdentifier=TC_PMS_partner-policy-requests_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_with_status_rejected |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_status_rejected, endPoint=/v1/partnermanager/partner-policy-requests?status={status}, role=partnerauth, templateFields=null, input={ "status": "rejected", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests with status Rejected are successfully retrieved, uniqueIdentifier=TC_PMS_partner-policy-requests_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_Invalid_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_Invalid_Token_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests retrieval fails when an invalid or expired token is used, uniqueIdentifier=TC_PMS_partner-policy-requests_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_invalid_pageNo_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_pageNo_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "pageNo": "-9", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests retrieval fails an error when an invalid pageNo is provided, uniqueIdentifier=TC_PMS_partner-policy-requests_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_invalid_pageSize_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_pageSize_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "pageSize": "-9", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests retrieval fails an error when an invalid pageSize is provided, uniqueIdentifier=TC_PMS_partner-policy-requests_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_invalid_sortFieldName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_sortFieldName_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "sortFieldName": "$%^%^&&^", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests retrieval fails an error when an invalid sortFieldName is provided, uniqueIdentifier=TC_PMS_partner-policy-requests_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_invalid_sortType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_sortType_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "sortType": "hdjfdfhg", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests retrieval fails an error when an invalid sortType is provided, uniqueIdentifier=TC_PMS_partner-policy-requests_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPartnerPolicyRequest_without_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPartnerPolicyRequest_without_Authentication_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner policy requests retrieval fails when no authentication is provided, uniqueIdentifier=TC_PMS_partner-policy-requests_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_All_Valid_Smoke, endPoint=/v1/partnermanager/admin-partners, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all partners are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetListOfPartners_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_All_Valid_Smoke_admin_dashboard |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_All_Valid_Smoke_admin_dashboard, endPoint=/v1/partnermanager/admin-partners, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all partners are successfully retrieved for the admin dashboard with valid inputs, uniqueIdentifier=TC_PMS_GetListOfPartners_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_Filter_OrgName_SortType_asc |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_Filter_OrgName_SortType_asc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=orgName&sortType=ASC&pageNo=0&pageSize=8&orgName=partner, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partners are successfully retrieved and sorted in ascending order when filtered by a valid organization name, uniqueIdentifier=TC_PMS_GetListOfPartners_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_Filter_isActive_type_true |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_Filter_isActive_type_true, endPoint=/v1/partnermanager/admin-partners?pageSize=8&isActive=true, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that only active partners are successfully retrieved when filtered by isActive=true, uniqueIdentifier=TC_PMS_GetListOfPartners_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_Invalid_token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_Invalid_token_Neg, endPoint=/v1/partnermanager/admin-partners, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when an invalid token is used, uniqueIdentifier=TC_PMS_GetListOfPartners_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_Status_Active_With_Certificate_Notuploaded |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_Status_Active_With_Certificate_Notuploaded, endPoint=/v1/partnermanager/admin-partners?status=active&certificateUploadStatus=not_uploaded, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that active partners without uploaded certificates are successfully retrieved, uniqueIdentifier=TC_PMS_GetListOfPartners_41, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_Status_Active_With_Certificate_uploaded |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_Status_Active_With_Certificate_uploaded, endPoint=/v1/partnermanager/admin-partners?status=active&certificateUploadStatus=uploaded, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that active partners with uploaded certificates are successfully retrieved, uniqueIdentifier=TC_PMS_GetListOfPartners_40, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_Status_Active_With_PartnerId |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_Status_Active_With_PartnerId, endPoint=/v1/partnermanager/admin-partners, role=partneradmin, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyGroupName": "$REMOVE$", "status": "active" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartnersInput, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that active partners are successfully retrieved when filtered by a valid partnerId, uniqueIdentifier=TC_PMS_GetListOfPartners_44, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_Status_Active_With_PartnerType |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_Status_Active_With_PartnerType, endPoint=/v1/partnermanager/admin-partners?status=active&partnerType=AUTH_PARTNER, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that active partners are successfully retrieved when filtered by a valid partner type, uniqueIdentifier=TC_PMS_GetListOfPartners_43, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_Status_Active_With_PolicyGroupName |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_Status_Active_With_PolicyGroupName, endPoint=/v1/partnermanager/admin-partners, role=partneradmin, templateFields=null, input={ "partnerId": "$REMOVE$", "policyGroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$", "status": "active" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartnersInput, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that active partners are successfully retrieved when filtered by a valid policy group name, uniqueIdentifier=TC_PMS_GetListOfPartners_42, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_Status_Active_With_Sort_Asc |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_Status_Active_With_Sort_Asc, endPoint=/v1/partnermanager/admin-partners?status=active&sortFieldName=orgName&sortType=asc, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that active partners are successfully retrieved and sorted in ascending order, uniqueIdentifier=TC_PMS_GetListOfPartners_39, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_Status_DeActivate_With_PartnerId |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_Status_DeActivate_With_PartnerId, endPoint=/v1/partnermanager/admin-partners, role=partneradmin, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyGroupName": "$REMOVE$", "status": "deactivated" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartnersInput, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that deactivated partners are successfully retrieved when filtered by a valid partnerId, uniqueIdentifier=TC_PMS_GetListOfPartners_46, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_Status_InActive_With_PartnerId |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_Status_InActive_With_PartnerId, endPoint=/v1/partnermanager/admin-partners, role=partneradmin, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyGroupName": "$REMOVE$", "status": "inactive" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartnersInput, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that inactive partners are successfully retrieved when filtered by a valid partnerId, uniqueIdentifier=TC_PMS_GetListOfPartners_45, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_With_Empty_Status_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_With_Empty_Status_Neg, endPoint=/v1/partnermanager/admin-partners?status=, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when the status parameter is empty, uniqueIdentifier=TC_PMS_GetListOfPartners_48, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_With_Numeric_Status_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_With_Numeric_Status_Neg, endPoint=/v1/partnermanager/admin-partners?status=1, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when a numeric value is provided for the status parameter instead of a valid status string, uniqueIdentifier=TC_PMS_GetListOfPartners_49, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_With_Status_Active |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_With_Status_Active, endPoint=/v1/partnermanager/admin-partners?status=active, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that only partners with status Active are successfully retrieved, uniqueIdentifier=TC_PMS_GetListOfPartners_35, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_With_Status_Active_And_Pagination |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_With_Status_Active_And_Pagination, endPoint=/v1/partnermanager/admin-partners?pageNo=1&pageSize=5&status=active, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "1" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that active partners are successfully retrieved with pagination applied, uniqueIdentifier=TC_PMS_GetListOfPartners_38, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_With_Status_Deactivated |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_With_Status_Deactivated, endPoint=/v1/partnermanager/admin-partners?status=deactivated, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that only partners with status Deactivated are successfully retrieved, uniqueIdentifier=TC_PMS_GetListOfPartners_37, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_With_Status_Inactive |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_With_Status_Inactive, endPoint=/v1/partnermanager/admin-partners?status=inactive, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that only partners with status Inactive are successfully retrieved, uniqueIdentifier=TC_PMS_GetListOfPartners_36, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_With_Status_special_chars_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_With_Status_special_chars_Neg, endPoint=/v1/partnermanager/admin-partners?status=%active, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when the status parameter contains special characters instead of a valid status value, uniqueIdentifier=TC_PMS_GetListOfPartners_50, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_certificateUploadStatus |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_certificateUploadStatus, endPoint=/v1/partnermanager/admin-partners?certificateUploadStatus=uploaded, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partners are successfully retrieved when filtered by certificate upload status, uniqueIdentifier=TC_PMS_GetListOfPartners_30, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_certificateUploadStatus_asc |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_certificateUploadStatus_asc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=certificateUploadStatus&sortType=asc&certificateUploadStatus=uploaded, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partners are successfully retrieved and sorted in ascending order by certificate upload status, uniqueIdentifier=TC_PMS_GetListOfPartners_31, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_certificateUploadStatus_asc_without_sortFieldName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_certificateUploadStatus_asc_without_sortFieldName_Neg, endPoint=/v1/partnermanager/admin-partners?sortType=asc&certificateUploadStatus=uploaded, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when sort type is provided without a sort field name for certificate upload status, uniqueIdentifier=TC_PMS_GetListOfPartners_33, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_certificateUploadStatus_desc |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_certificateUploadStatus_desc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=certificateUploadStatus&sortType=desc&certificateUploadStatus=uploaded, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partners are successfully retrieved and sorted in descending order by certificate upload status, uniqueIdentifier=TC_PMS_GetListOfPartners_32, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_emailAddress_asc |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_emailAddress_asc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=asc&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partners are successfully retrieved and sorted in ascending order when filtered by a valid email address, uniqueIdentifier=TC_PMS_GetListOfPartners_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_empty_pageno_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_empty_pageno_Neg, endPoint=/v1/partnermanager/admin-partners?pageNo=111111, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when the page number is empty, uniqueIdentifier=TC_PMS_GetListOfPartners_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_empty_partnerid_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_empty_partnerid_Neg, endPoint=/v1/partnermanager/admin-partners?partnerId=bcbcb, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when the partnerId is empty, uniqueIdentifier=TC_PMS_GetListOfPartners_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_empty_partnertype_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_empty_partnertype_Neg, endPoint=/v1/partnermanager/admin-partners?partnerType=dfdgd, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when the partnerType is empty, uniqueIdentifier=TC_PMS_GetListOfPartners_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_invalid_pageno_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_invalid_pageno_Neg, endPoint=/v1/partnermanager/admin-partners?pageNo=-1, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when an invalid page number is provided, uniqueIdentifier=TC_PMS_GetListOfPartners_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_invalid_pagesize_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_invalid_pagesize_Neg, endPoint=/v1/partnermanager/admin-partners?pageSize=-12, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when an invalid page size is provided, uniqueIdentifier=TC_PMS_GetListOfPartners_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_invalid_partnerid_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_invalid_partnerid_Neg, endPoint=/v1/partnermanager/admin-partners?partnerId=-dndn333, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when an invalid partnerId is provided, uniqueIdentifier=TC_PMS_GetListOfPartners_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_invalid_partnertype_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_invalid_partnertype_Neg, endPoint=/v1/partnermanager/admin-partners?partnerType=2233ddd, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when an invalid partnerType is provided, uniqueIdentifier=TC_PMS_GetListOfPartners_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_invalid_sortFieldName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_invalid_sortFieldName_Neg, endPoint=/v1/partnermanager/admin-partners?sortFieldName=-1&sortType=-1, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when an invalid sort field name is provided, uniqueIdentifier=TC_PMS_GetListOfPartners_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_invalid_sortType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_invalid_sortType_Neg, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=-1, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_358" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when an invalid sort type is provided, uniqueIdentifier=TC_PMS_GetListOfPartners_34, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_invalid_sortfield_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_invalid_sortfield_Neg, endPoint=/v1/partnermanager/admin-partners?sortFieldName=a2a33, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when an invalid sort field is provided, uniqueIdentifier=TC_PMS_GetListOfPartners_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_invalid_sorttype_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_invalid_sorttype_Neg, endPoint=/v1/partnermanager/admin-partners?sortFieldName=a2a33, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when an invalid sort type is provided, uniqueIdentifier=TC_PMS_GetListOfPartners_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_partnerType_Sort_asc |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_partnerType_Sort_asc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerType&sortType=asc&pageSize=8&partnerType=Auth, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partners are successfully retrieved and sorted in ascending order when filtered by a valid partner type, uniqueIdentifier=TC_PMS_GetListOfPartners_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_partnerType_Sort_desc |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_partnerType_Sort_desc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerType&sortType=desc&pageSize=8&partnerType=Auth, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partners are successfully retrieved and sorted in descending order when filtered by a valid partner type, uniqueIdentifier=TC_PMS_GetListOfPartners_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_partnerid_asc |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_partnerid_asc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=asc&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partners are successfully retrieved and sorted in ascending order when filtered by a valid partnerId, uniqueIdentifier=TC_PMS_GetListOfPartners_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_partnerid_desc |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_partnerid_desc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=desc&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partners are successfully retrieved and sorted in descending order when filtered by a valid partnerId, uniqueIdentifier=TC_PMS_GetListOfPartners_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_status_invalid_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_status_invalid_Neg, endPoint=/v1/partnermanager/admin-partners?status=invalid, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when an invalid status value is provided, uniqueIdentifier=TC_PMS_GetListOfPartners_47, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_with_deactivated_partner_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_with_deactivated_partner_Neg, endPoint=/v1/partnermanager/admin-partners?isActive=false, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that deactivated partners are not retrieved in the partner list, uniqueIdentifier=TC_PMS_GetListOfPartners_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_with_empty_emailAddress_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_with_empty_emailAddress_Neg, endPoint=/v1/partnermanager/admin-partners?emailAddress=454646, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when the email address is empty, uniqueIdentifier=TC_PMS_GetListOfPartners_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_with_empty_organization_name_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_with_empty_organization_name_Neg, endPoint=/v1/partnermanager/admin-partners?orgName=123@1sse, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when the organization name is empty, uniqueIdentifier=TC_PMS_GetListOfPartners_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_with_empty_policyGroup_Name_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_with_empty_policyGroup_Name_Neg, endPoint=/v1/partnermanager/admin-partners?policyGroupName=, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when the policy group name is empty, uniqueIdentifier=TC_PMS_GetListOfPartners_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_with_empty_sort_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_with_empty_sort_Neg, endPoint=/v1/partnermanager/admin-partners?sortType=&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when the sort parameter is empty, uniqueIdentifier=TC_PMS_GetListOfPartners_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_with_invalid_email_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_with_invalid_email_Neg, endPoint=/v1/partnermanager/admin-partners?emailAddress=2t63t@@@, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when an invalid email address is provided, uniqueIdentifier=TC_PMS_GetListOfPartners_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_with_invalid_organization_name_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_with_invalid_organization_name_Neg, endPoint=/v1/partnermanager/admin-partners?orgName=123@1sse, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when an invalid organization name is provided, uniqueIdentifier=TC_PMS_GetListOfPartners_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_with_invalid_policyGroup_Name_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_with_invalid_policyGroup_Name_Neg, endPoint=/v1/partnermanager/admin-partners?policyGroupName=-12, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when an invalid policy group name is provided, uniqueIdentifier=TC_PMS_GetListOfPartners_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_with_invalid_sort_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_with_invalid_sort_Neg, endPoint=/v1/partnermanager/admin-partners?sortType=3@@#&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when an invalid sort parameter is provided, uniqueIdentifier=TC_PMS_GetListOfPartners_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPartners_with_not_uploaded_email_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPartners_with_not_uploaded_email_Neg, endPoint=/v1/partnermanager/admin-partners?certificateUploadStatus=not_uploaded, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner list retrieval fails when the email address is not uploaded, uniqueIdentifier=TC_PMS_GetListOfPartners_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetDetailsOfPartner_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetDetailsOfPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$" }, output= { "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$" }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all details of a partner are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetPartnerDetails_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetDetailsOfPartner_DevicePartner_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetDetailsOfPartner_DevicePartner_All_Valid_Smoke, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$" }, output= { "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$" }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all details of a device partner are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetPartnerDetails_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetDetailsOfPartner_invalid_token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetDetailsOfPartner_invalid_token_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=invalidtoken, templateFields=null, input={ "partnerId": "111777" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner details retrieval fails when an invalid token is used, uniqueIdentifier=TC_PMS_GetPartnerDetails_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetDetailsOfPartner_with_admin_role_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetDetailsOfPartner_with_admin_role_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=partnerauth, templateFields=null, input={ "partnerId": "111777" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner details retrieval fails when attempted with an admin role that is not authorized, uniqueIdentifier=TC_PMS_GetPartnerDetails_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetDetailsOfPartner_with_invalid_partner_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetDetailsOfPartner_with_invalid_partner_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "@334ds356" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner details retrieval fails when requested for an invalid partner, uniqueIdentifier=TC_PMS_GetPartnerDetails_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetDetailsOfPartner_with_unauthor_token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetDetailsOfPartner_with_unauthor_token_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=resident, templateFields=null, input={ "partnerId": " " }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner details retrieval fails when an unauthorized privileged token is used, uniqueIdentifier=TC_PMS_GetPartnerDetails_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetDetailsOfPartner_with_unauthorized_token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetDetailsOfPartner_with_unauthorized_token_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=resident, templateFields=null, input={ "partnerId": " " }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner details retrieval fails when an unauthorized token is used, uniqueIdentifier=TC_PMS_GetPartnerDetails_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetDetailsOfPartner_without_admin_role_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetDetailsOfPartner_without_admin_role_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=idrepo, templateFields=null, input={ "partnerId": " " }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner details retrieval fails when attempted without an admin role, uniqueIdentifier=TC_PMS_GetPartnerDetails_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_All_Valid_Smoke, endPoint=/v1/policymanager/policies/v2, role=partneradmin, templateFields=null, input={ }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the system successfully retrieves the list of policies when all required inputs and query parameters are valid, uniqueIdentifier=TC_PMS_listofPolicies_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_invalid_token_neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_invalid_token_neg, endPoint=/v1/policymanager/policies/v2, role=POLICYMANAGER, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that fetching the list of policies fails when an invalid access token is used and the system returns the appropriate authorization error response, uniqueIdentifier=TC_PMS_listofPolicies_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_combination_twoattributes_valid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_combination_twoattributes_valid, endPoint=/v1/policymanager/policies/v2?policyId={policyId}&policyName={policyName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "1", "policyName": "1", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API successfully retrieves policies when filtered using a combination of two valid attributes, uniqueIdentifier=TC_PMS_listofPolicies_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_negative_pageNo_neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_negative_pageNo_neg, endPoint=/v1/policymanager/policies/v2?pageNo={pageNo}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "-6", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails when a negative page number is provided, uniqueIdentifier=TC_PMS_listofPolicies_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_negative_pageSize_neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_negative_pageSize_neg, endPoint=/v1/policymanager/policies/v2?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "-6", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails when a negative page size is provided, uniqueIdentifier=TC_PMS_listofPolicies_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_pageNo_specified_valid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_pageNo_specified_valid, endPoint=/v1/policymanager/policies/v2?pageNo={pageNo}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "6", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify that the API returns policies for the specified valid page number, uniqueIdentifier=TC_PMS_listofPolicies_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_pagesize_specified_valid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_pagesize_specified_valid, endPoint=/v1/policymanager/policies/v2?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "6", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify that the API returns policies limited to the specified valid pageSize, uniqueIdentifier=TC_PMS_listofPolicies_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_policyDescription_random_invalid_neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_policyDescription_random_invalid_neg, endPoint=/v1/policymanager/policies/v2?policyDescription={policyDescription}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "3fdfds", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "0" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails or returns no results when filtered with a random or invalid policy description, uniqueIdentifier=TC_PMS_listofPolicies_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_policyDescription_valid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_policyDescription_valid, endPoint=/v1/policymanager/policies/v2?policyDescription={policyDescription}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "a", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API successfully retrieves policies when filtered by a valid policy description, uniqueIdentifier=TC_PMS_listofPolicies_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_policyGroupName_valid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_policyGroupName_valid, endPoint=/v1/policymanager/policies/v2?policyGroupName={policyGroupName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "ab", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API successfully retrieves policies when filtered by a valid policy group name, uniqueIdentifier=TC_PMS_listofPolicies_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_policyId_valid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_policyId_valid, endPoint=/v1/policymanager/policies/v2?policyId={policyId}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "1", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API successfully retrieves the policy details when a valid policy ID is provided, uniqueIdentifier=TC_PMS_listofPolicies_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_policyName_valid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_policyName_valid, endPoint=/v1/policymanager/policies/v2?policyName={policyName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "a", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API successfully retrieves policies when filtered by a valid policy name, uniqueIdentifier=TC_PMS_listofPolicies_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_sortFieldName_invalid_neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_sortFieldName_invalid_neg, endPoint=/v1/policymanager/policies/v2?sortFieldName={sortFieldName}&sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "hfghfgdhf", "sortType": "asc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails when an invalid sort field name is provided, uniqueIdentifier=TC_PMS_listofPolicies_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_sortFieldName_valid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_sortFieldName_valid, endPoint=/v1/policymanager/policies/v2?sortFieldName={sortFieldName}&sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "status", "sortType": "asc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API successfully retrieves policies when a valid sort field name is provided, uniqueIdentifier=TC_PMS_listofPolicies_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_sortType_asc |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_sortType_asc, endPoint=/v1/policymanager/policies/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "asc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify that policies are successfully retrieved in ascending order when a valid sort type is specified, uniqueIdentifier=TC_PMS_listofPolicies_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_sortType_desc |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_sortType_desc, endPoint=/v1/policymanager/policies/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "desc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify that policies are successfully retrieved in descending order when a valid sort type is specified, uniqueIdentifier=TC_PMS_listofPolicies_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_sortType_invalid_neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_sortType_invalid_neg, endPoint=/v1/policymanager/policies/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "abdcfegff", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_358" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails when an invalid sort type is provided, uniqueIdentifier=TC_PMS_listofPolicies_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_status_activated |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_status_activated, endPoint=/v1/policymanager/policies/v2?status={status}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "activated" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns only policies with Activated status when the status filter is set to activated, uniqueIdentifier=TC_PMS_listofPolicies_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_status_deactivated |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_status_deactivated, endPoint=/v1/policymanager/policies/v2?status={status}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "deactivated" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns only policies with Deactivated status when the status filter is set to deactivated, uniqueIdentifier=TC_PMS_listofPolicies_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_with_status_draft |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_with_status_draft, endPoint=/v1/policymanager/policies/v2?status={status}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "draft" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns only policies with Draft status when the status filter is set to draft, uniqueIdentifier=TC_PMS_listofPolicies_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_without_Authentication_neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_without_Authentication_neg, endPoint=/v1/policymanager/policies/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that fetching the list of policies fails when no authentication token is provided and the system returns the appropriate unauthorized error response, uniqueIdentifier=TC_PMS_listofPolicies_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfPolicies_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfPolicies_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfPoliciesRequest/getListOfPoliciesRequest, outputTemplate=pms/GetListOfPoliciesRequest/getListOfPoliciesRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API successfully retrieves all policies when all inputs and filters are valid, uniqueIdentifier=TC_PMS_GetListOfPolicyrequests_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllOidcClient_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllOidcClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/GetAllOidcClient/getAllOidcClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all OIDC clients are successfully retrieved when a valid request with proper authorization is made, uniqueIdentifier=TC_PMS_GetAllOidcClient_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_ForNeg_all_Valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_ForNeg_all_Valid_sid, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/OIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate OIDC client creation fails with invalid inputs, uniqueIdentifier=TC_PMS_CreateOIDCClient_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/OIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that an OIDC client is created successfully with all required valid inputs as part of a smoke test, uniqueIdentifier=TC_PMS_CreateOIDCClient_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_invalid_RedirectUri_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_invalid_RedirectUri_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$abcdefg", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails with an invalid redirect URI, uniqueIdentifier=TC_PMS_CreateOIDCClient_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_invalid_auth_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_invalid_auth_neg, endPoint=/v1/partnermanager/oauth/client, role=invalidtoken, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails with invalid authentication details, uniqueIdentifier=TC_PMS_CreateOIDCClient_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_invalid_granttypes_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_invalid_granttypes_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "hghghgg", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when invalid grant types are provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_invalid_logoUri_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_invalid_logoUri_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https//", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails with an invalid logo URI, uniqueIdentifier=TC_PMS_CreateOIDCClient_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_invalid_policyID_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_invalid_policyID_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89767", "policyId": "fgdggh", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails with an invalid policy ID, uniqueIdentifier=TC_PMS_CreateOIDCClient_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_invalid_publickey_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_invalid_publickey_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": {}, "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when an invalid public key is provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_without_granttypes_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_without_granttypes_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "$REMOVE$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when grant types are not provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_without_name_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_without_name_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "$REMOVE$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the client name is not provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_without_publickey_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_without_publickey_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$REMOVE$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the public key is not provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllOauthClient_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllOauthClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOauthClient/getAllOauthClient, outputTemplate=pms/GetAllOauthClient/getAllOauthClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all OAuth clients are successfully retrieved when a valid request is made, uniqueIdentifier=TC_PMS_GetAllOauthClient_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Empty_ClientAuthMethods_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Empty_ClientAuthMethods_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_ESI_010" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when client authentication methods are provided but empty, uniqueIdentifier=TC_PMS_CreateOIDCClient_33, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Empty_ClientNameLangMap |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Empty_ClientNameLangMap, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "$REMOVE$", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "status": "ACTIVE" }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the client name language map is empty, uniqueIdentifier=TC_PMS_CreateOIDCClient_35, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Empty_GrantTypes_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Empty_GrantTypes_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_ESI_009" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when grant types are empty, uniqueIdentifier=TC_PMS_CreateOIDCClient_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Empty_Name_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Empty_Name_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate OIDC client creation fails with an empty name, uniqueIdentifier=TC_PMS_CreateOIDCClient_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Empty_PolicyID_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Empty_PolicyID_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the policy ID is empty, uniqueIdentifier=TC_PMS_CreateOIDCClient_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Empty_PublicKey_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Empty_PublicKey_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "{}", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the public key is empty, uniqueIdentifier=TC_PMS_CreateOIDCClient_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Empty_RedirectURLs_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Empty_RedirectURLs_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_ESI_017" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when redirect URLs are empty, uniqueIdentifier=TC_PMS_CreateOIDCClient_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Empty_UserResponceType_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Empty_UserResponceType_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_POLICY_ERROR_014" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the user response type is empty, uniqueIdentifier=TC_PMS_CreateOIDCClient_37, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_GrantTypes_Extra_Spaces_Trimmed_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_GrantTypes_Extra_Spaces_Trimmed_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": " authorization_code ", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_ESI_009" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation handles correctly when grant types contain extra spaces, uniqueIdentifier=TC_PMS_CreateOIDCClient_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_GrantTypes_Special_Character_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_GrantTypes_Special_Character_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "@#$4321", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_ESI_009" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when grant types contain special characters, uniqueIdentifier=TC_PMS_CreateOIDCClient_30, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Invalid_ClientAuthMethods_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Invalid_ClientAuthMethods_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "1234", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_ESI_010" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when invalid client authentication methods are provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_34, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Invalid_ConsentExpireInMins_String_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Invalid_ConsentExpireInMins_String_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "StringValue" }, output={ "responseCode": "400" }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when consentExpireInMins is provided as a string instead of a numeric value, uniqueIdentifier=TC_PMS_CreateOIDCClient_45, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Invalid_ConsentExpireInMins_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Invalid_ConsentExpireInMins_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "0" }, output={ "errors": [ { "errorCode": "PMS_POLICY_ERROR_015" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when an invalid value is provided for consentExpireInMins, uniqueIdentifier=TC_PMS_CreateOIDCClient_44, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Invalid_GrantTypes_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Invalid_GrantTypes_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "invalid_grant_type", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_ESI_009" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when invalid grant types are provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Invalid_LogoUri_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Invalid_LogoUri_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "RTTS://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when an invalid logo URI is provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Invalid_PublicKey_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Invalid_PublicKey_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "invalid-public-key", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "responseCode": "400" }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient2, outputTemplate=pms/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when an invalid public key is provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Invalid_RedirectURLs_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Invalid_RedirectURLs_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "invalid-redirect-uri", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_ESI_017" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when invalid redirect URLs are provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Invalid_UserResponceType_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Invalid_UserResponceType_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS_INVALID", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_POLICY_ERROR_014" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when an invalid user response type is provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_36, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Invalid_authPartnerId_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Invalid_authPartnerId_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "INVALID-999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_POLICY_ERROR_009" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when an invalid auth partner ID is provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Invalid_id_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Invalid_id_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "invalid.id.value", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when an invalid client ID is provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_47, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Invalid_type_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Invalid_type_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "none", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_POLICY_ERROR_017" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when an invalid client type is provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_38, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_LogoUri_As_Special_Character_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_LogoUri_As_Special_Character_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "%!!p:))l@g@.c0^@!mg.!n", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the logo URI contains special characters, uniqueIdentifier=TC_PMS_CreateOIDCClient_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Multiple_GrantTypes_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Multiple_GrantTypes_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code and refresh_token", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_ESI_009" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when multiple invalid grant types are provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_SignupBannerRequired_False_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_SignupBannerRequired_False_Smoke_sid, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": false, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "status": "ACTIVE" }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation succeeds when signupBannerRequired is set to false, uniqueIdentifier=TC_PMS_CreateOIDCClient_42, additionalDependencies=TC_PMS_RequestAPIKeyForAuthPartner_02 |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Special_Character_PolicyID_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Special_Character_PolicyID_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "@#$%^&*", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the policy ID contains special characters, uniqueIdentifier=TC_PMS_CreateOIDCClient_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Special_Character_authPartnerId_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Special_Character_authPartnerId_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "@$ab*&", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the auth partner ID contains special characters, uniqueIdentifier=TC_PMS_CreateOIDCClient_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Valid_ClientAuthMethods_Containing_Only_Private_key_jwt |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Valid_ClientAuthMethods_Containing_Only_Private_key_jwt, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "status": "ACTIVE" }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation succeeds when the client authentication methods contain only private_key_jwt, uniqueIdentifier=TC_PMS_CreateOIDCClient_31, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_With_invalid_Version_integer_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_With_invalid_Version_integer_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "2", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the client version is provided as an invalid integer, uniqueIdentifier=TC_PMS_CreateOIDCClient_53, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_With_invalid_Version_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_With_invalid_Version_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "2.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when an invalid client version is provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_52, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_With_null_Version_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_With_null_Version_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "null", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the client version is null, uniqueIdentifier=TC_PMS_CreateOIDCClient_51, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Without_ClientAuthMethods_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Without_ClientAuthMethods_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "$REMOVE$", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when client authentication methods are not provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_32, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Without_ConsentExpireInMins_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Without_ConsentExpireInMins_smoke, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "$REMOVE$" }, output={ "status": "ACTIVE" }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation succeeds when consentExpireInMins is not provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_46, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Without_GrantTypes_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Without_GrantTypes_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "$REMOVE$", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when grant types are not provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Without_LogoUri_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Without_LogoUri_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "$REMOVE$", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the logo URI is not provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Without_Name_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Without_Name_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "$REMOVE$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate OIDC client creation fails when the name is not provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Without_PolicyID_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Without_PolicyID_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$REMOVE$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the policy ID is not provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Without_PublicKey_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Without_PublicKey_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$REMOVE$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the public key is not provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Without_RedirectURLs_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Without_RedirectURLs_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$REMOVE$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when redirect URLs are not provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Without_RequestTime_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Without_RequestTime_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$REMOVE$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the request time is not provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_54, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Without_Version_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Without_Version_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the client version is not provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_50, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Without_authPartnerId_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Without_authPartnerId_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$REMOVE$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the auth partner ID is not provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_Without_id_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_Without_id_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the client ID is not provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_48, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_all_ValidName_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_all_ValidName_Smoke_sid, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "@Client", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "status": "ACTIVE" }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that an OIDC client is created successfully when a valid name is provided along with all other required parameters, uniqueIdentifier=TC_PMS_CreateOIDCClient_07, additionalDependencies=TC_PMS_RequestAPIKeyForAuthPartner_02 |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_all_Valid_Name_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_all_Valid_Name_Smoke_sid, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "Test", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "status": "ACTIVE" }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate OIDC client creation with a valid name, uniqueIdentifier=TC_PMS_CreateOIDCClient_03, additionalDependencies=TC_PMS_RequestAPIKeyForAuthPartner_02 |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "status": "ACTIVE" }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that an OIDC client is created successfully with all required valid inputs as part of a smoke test, uniqueIdentifier=TC_PMS_CreateOIDCClient_01, additionalDependencies=TC_PMS_RequestAPIKeyForAuthPartner_02 |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_all_Valid_type_link_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_all_Valid_type_link_Smoke, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "link", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "status": "ACTIVE" }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation succeeds for all valid client types, uniqueIdentifier=TC_PMS_CreateOIDCClient_39, additionalDependencies=TC_PMS_RequestAPIKeyForAuthPartner_02 |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_all_Valid_type_login_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_all_Valid_type_login_Smoke, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "login", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "status": "ACTIVE" }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation succeeds for all valid client types during login scenarios, uniqueIdentifier=TC_PMS_CreateOIDCClient_40, additionalDependencies=TC_PMS_RequestAPIKeyForAuthPartner_02 |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_empty_type_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_empty_type_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_POLICY_ERROR_017" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the client type is empty, uniqueIdentifier=TC_PMS_CreateOIDCClient_41, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_forgotPwdLinkRequired_False_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_forgotPwdLinkRequired_False_Smoke_sid, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": false, "consentExpireInMins": "30" }, output={ "status": "ACTIVE" }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation succeeds when forgotPwdLinkRequired is set to false, uniqueIdentifier=TC_PMS_CreateOIDCClient_43, additionalDependencies=TC_PMS_RequestAPIKeyForAuthPartner_02 |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_invalid_Name_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_invalid_Name_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "@#$%^&*", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate OIDC client creation fails with an invalid name, uniqueIdentifier=TC_PMS_CreateOIDCClient_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_invalid_Name_with_tab_Characters_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_invalid_Name_with_tab_Characters_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "Client\nTest", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "responseCode": "400" }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the name contains tab characters, uniqueIdentifier=TC_PMS_CreateOIDCClient_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_invalid_PolicyID_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_invalid_PolicyID_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "INVALID-999", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when an invalid policy ID is provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_invalid_auth_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_invalid_auth_neg, endPoint=/v1/partnermanager/oidc-clients, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.create.oidc.client.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when invalid authentication details are provided, uniqueIdentifier=TC_PMS_CreateOIDCClient_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateOIDCClient_with_null_id_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateOIDCClient_with_null_id_neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "id": "null", "version": "1.0", "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "type": "verify", "subTitle": "subTitle", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/OIDCClientEnhancement/CreateOIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client creation fails when the client ID is null, uniqueIdentifier=TC_PMS_CreateOIDCClient_49, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_Empty_ClientName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_Empty_ClientName_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client empty client name, uniqueIdentifier=TC_PMS_UpdateOIDCClient_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_Invalid_ClientAuthMethod_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_Invalid_ClientAuthMethod_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "invalid_auth_method", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_ESI_010" } ] }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client with invalid client authentication method, uniqueIdentifier=TC_PMS_UpdateOIDCClient_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_Invalid_ClientNameLangMap_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_Invalid_ClientNameLangMap_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_POLICY_ERROR_019" } ] }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient2, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client with invalid client name lang map format, uniqueIdentifier=TC_PMS_UpdateOIDCClient_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_Invalid_ConsentExpireInMins_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_Invalid_ConsentExpireInMins_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "*" }, output={ "responseCode": "400" }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/responseCode, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client with invalid consent expire in mins format, uniqueIdentifier=TC_PMS_UpdateOIDCClient_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_Invalid_ForgotPwdLinkRequired_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_Invalid_ForgotPwdLinkRequired_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": "false9", "consentExpireInMins": "30" }, output={ "responseCode": "400" }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/responseCode, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client with invalid forgot password link required format, uniqueIdentifier=TC_PMS_UpdateOIDCClient_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_Invalid_GrantType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_Invalid_GrantType_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "invalid_grant_type", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_ESI_009" } ] }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client with invalid grant type format, uniqueIdentifier=TC_PMS_UpdateOIDCClient_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_Invalid_SignupBannerRequired_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_Invalid_SignupBannerRequired_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": "false9", "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "responseCode": "400" }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/responseCode, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client with invalid signup banner required format, uniqueIdentifier=TC_PMS_UpdateOIDCClient_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_Invalid_Status_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_Invalid_Status_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "INACTIVEINVALID", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client with invalid status, uniqueIdentifier=TC_PMS_UpdateOIDCClient_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_Invalid_Subtitle |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_Invalid_Subtitle, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Name_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "invalid_subtitle_@123", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "clientId": "$ID:CreateOIDCClient_all_Valid_Name_Smoke_sid_clientId$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/oIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client with invalid subtitle format, uniqueIdentifier=TC_PMS_UpdateOIDCClient_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_Invalid_Type_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_Invalid_Type_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "subTitle", "type": "logout", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_POLICY_ERROR_017" } ] }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client with invalid type format, uniqueIdentifier=TC_PMS_UpdateOIDCClient_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_Invalid_UserInfoResponceType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_Invalid_UserInfoResponceType_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWES", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_POLICY_ERROR_014" } ] }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client with invalid userinfo response type, uniqueIdentifier=TC_PMS_UpdateOIDCClient_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_Invalid_UserResponceType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_Invalid_UserResponceType_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWExc", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_POLICY_ERROR_014" } ] }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client with invalid userinfo response type format, uniqueIdentifier=TC_PMS_UpdateOIDCClient_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_Update_ClientName_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_Update_ClientName_Smoke_sid, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 897669876", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/oIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client updating client name, uniqueIdentifier=TC_PMS_UpdateOIDCClient_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_With_Empty_ClientID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_With_Empty_ClientID_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": " ", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "PMS_PRT_099" } ] }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client with empty client id, uniqueIdentifier=TC_PMS_UpdateOIDCClient_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_Without_AdditionalConfig |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_Without_AdditionalConfig, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_ValidName_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "clientId": "$ID:CreateOIDCClient_all_ValidName_Smoke_sid_clientId$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient3, outputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/oIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client without additional config request, uniqueIdentifier=TC_PMS_UpdateOIDCClient_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_all_InValid_Auth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_all_InValid_Auth_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client with invalid token, uniqueIdentifier=TC_PMS_UpdateOIDCClient_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/oIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client, uniqueIdentifier=TC_PMS_UpdateOIDCClient_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_all_Valid_Update_Logourl_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_all_Valid_Update_Logourl_Smoke_sid, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.update.oidc.client.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 89766", "logoUri": "https://health-services.com/logoo.png", "redirectUris": "$IDPREDIRECTURI$", "status": "ACTIVE", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt", "clientNameLangMap": "OIDC TEST CLIENT", "userinfoResponseType": "JWS", "title": "Title", "subTitle": "subTitle", "type": "verify", "signupBannerRequired": true, "forgotPwdLinkRequired": true, "consentExpireInMins": "30" }, output={ "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/UpdateoIDCClient, outputTemplate=pms/OIDCClientEnhancement/UpdateOIDCClient/oIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating OAUTH Client updating logo url, uniqueIdentifier=TC_PMS_UpdateOIDCClient_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClientV2_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClientV2_All_Valid_Smoke, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.deactivate.oidc.client.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_ValidName_Smoke_sid_clientId$", "status": "INACTIVE" }, output={ }, inputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClient, outputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClientResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation succeeds for all valid clients, uniqueIdentifier=TC_PMS_DeactivateOIDCClientV2_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClientV2_With_Partner_Admin_Role |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClientV2_With_Partner_Admin_Role, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.oidc.client.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_Valid_Name_Smoke_sid_clientId$", "status": "INACTIVE" }, output={ }, inputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClient, outputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClientResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation succeeds when performed by a user with the Partner Admin role, uniqueIdentifier=TC_PMS_DeactivateOIDCClientV2_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClientV2NegTC_With_Deactivated_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClientV2NegTC_With_Deactivated_ClientId_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.deactivate.oidc.client.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_ValidName_Smoke_sid_clientId$", "status": "INACTIVE" }, output={ "errors": [ { "errorCode": "PMS_ESI_008" } ] }, inputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClient, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when the client ID is already deactivated, uniqueIdentifier=TC_PMS_DeactivateOIDCClientV2NegTC_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClientV2NegTC_With_Empty_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClientV2NegTC_With_Empty_ID_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_ValidName_Smoke_sid_clientId$", "status": "INACTIVE" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClient, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when the client ID is empty, uniqueIdentifier=TC_PMS_DeactivateOIDCClientV2NegTC_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClientV2NegTC_With_Empty_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClientV2NegTC_With_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.deactivate.oidc.client.patch", "version": "1.0", "requestTime": "", "clientId": "$ID:CreateOIDCClient_all_ValidName_Smoke_sid_clientId$", "status": "INACTIVE" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClient, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when the request time is empty, uniqueIdentifier=TC_PMS_DeactivateOIDCClientV2NegTC_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClientV2NegTC_With_Empty_Status_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClientV2NegTC_With_Empty_Status_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.deactivate.oidc.client.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_ValidName_Smoke_sid_clientId$", "status": "" }, output={ "errors": [ { "errorCode": "PMS_POLICY_ERROR_024" } ] }, inputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClient, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when the status is empty, uniqueIdentifier=TC_PMS_DeactivateOIDCClientV2NegTC_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClientV2NegTC_With_Empty_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClientV2NegTC_With_Empty_Version_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.deactivate.oidc.client.patch", "version": "", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_ValidName_Smoke_sid_clientId$", "status": "INACTIVE" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClient, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when the client version is empty, uniqueIdentifier=TC_PMS_DeactivateOIDCClientV2NegTC_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClientV2NegTC_With_Invalid_Access_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClientV2NegTC_With_Invalid_Access_Token_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.deactivate.oidc.client.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_ValidName_Smoke_sid_clientId$", "status": "INACTIVE" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClient, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when an invalid access token is used, uniqueIdentifier=TC_PMS_DeactivateOIDCClientV2NegTC_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClientV2NegTC_With_Invalid_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClientV2NegTC_With_Invalid_ClientId_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.deactivate.oidc.client.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "invalid_clientId", "status": "INACTIVE" }, output={ "errors": [ { "errorCode": "PMS_ESI_004" } ] }, inputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClient, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when an invalid client ID is provided, uniqueIdentifier=TC_PMS_DeactivateOIDCClientV2NegTC_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClientV2NegTC_With_Invalid_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClientV2NegTC_With_Invalid_ID_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "@invalid_id", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_ValidName_Smoke_sid_clientId$", "status": "INACTIVE" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClient, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when an invalid client ID is provided, uniqueIdentifier=TC_PMS_DeactivateOIDCClientV2NegTC_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClientV2NegTC_With_Invalid_Status_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClientV2NegTC_With_Invalid_Status_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.deactivate.oidc.client.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_ValidName_Smoke_sid_clientId$", "status": "REJECTED" }, output={ "errors": [ { "errorCode": "PMS_POLICY_ERROR_024" } ] }, inputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClient, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when an invalid status is provided, uniqueIdentifier=TC_PMS_DeactivateOIDCClientV2NegTC_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClientV2NegTC_With_Invalid_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClientV2NegTC_With_Invalid_Version_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.deactivate.oidc.client.patch", "version": "@invalid-version", "requestTime": "$TIMESTAMP$", "clientId": "$ID:CreateOIDCClient_all_ValidName_Smoke_sid_clientId$", "status": "INACTIVE" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClient, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when using a valid client ID with an invalid version, uniqueIdentifier=TC_PMS_DeactivateOIDCClientV2NegTC_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClientV2NegTC_With_Past_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClientV2NegTC_With_Past_RequestTime_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.deactivate.oidc.client.patch", "version": "1.0", "requestTime": "2025-12-21T19:36:22.309Z", "clientId": "$ID:CreateOIDCClient_all_ValidName_Smoke_sid_clientId$", "status": "INACTIVE" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClient, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when the request time provided is in the past, uniqueIdentifier=TC_PMS_DeactivateOIDCClientV2NegTC_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClientV2NegTC_With_SpecialCharacter_In_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClientV2NegTC_With_SpecialCharacter_In_ClientId_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.deactivate.oidc.client.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "clientId": "@clientId", "status": "INACTIVE" }, output={ "errors": [ { "errorCode": "PMS_PRT_099" } ] }, inputTemplate=pms/OIDCClientEnhancement/DeactivateOIDCClient/DeactivateOIDCClient, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when the client ID contains special characters, uniqueIdentifier=TC_PMS_DeactivateOIDCClientV2NegTC_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2_All_Valid_Smoke, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ }, output={ }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClientInput, outputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details succeeds for all valid clients, uniqueIdentifier=TC_PMS_GetOIDCClientV2_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2_LoggedIn_Users_With_Partner_Admin_Role |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2_LoggedIn_Users_With_Partner_Admin_Role, endPoint=/v1/partnermanager/oidc-clients, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClientInput, outputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details succeeds for users logged in with the Partner Admin role, uniqueIdentifier=TC_PMS_GetOIDCClientV2_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2_Using_ClientName_And_SortType_Asc |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2_Using_ClientName_And_SortType_Asc, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "0", "pageSize": "8", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "sortFieldName": "clientName", "sortType": "asc", "status": "$REMOVE$" }, output={ }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client details can be retrieved and sorted in ascending order by client name, uniqueIdentifier=TC_PMS_GetOIDCClientV2_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2_Using_PartnerId |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2_Using_PartnerId, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$" }, output={ }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client details can be retrieved using a valid Partner ID, uniqueIdentifier=TC_PMS_GetOIDCClientV2_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2_Using_PolicyId |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2_Using_PolicyId, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_name$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$" }, output={ }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client details can be retrieved using a valid Policy ID, uniqueIdentifier=TC_PMS_GetOIDCClientV2_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2_With_Status_Active |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2_With_Status_Active, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "ACTIVE" }, output={ }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that only OIDC clients with an active status are retrieved successfully, uniqueIdentifier=TC_PMS_GetOIDCClientV2_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2_With_Status_Inactive |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2_With_Status_Inactive, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "INACTIVE" }, output={ }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that only OIDC clients with an inactive status are retrieved successfully, uniqueIdentifier=TC_PMS_GetOIDCClientV2_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2NegTC_With_Different_Partner's_Access_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2NegTC_With_Different_Partner's_Access_Token_Neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerdevice, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClientInput, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when an access token from a different partner is used, uniqueIdentifier=TC_PMS_GetOIDCClientV2NegTC_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2NegTC_With_Invalid_Access_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2NegTC_With_Invalid_Access_Token_Neg, endPoint=/v1/partnermanager/oidc-clients, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClientInput, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when an invalid access token is used, uniqueIdentifier=TC_PMS_GetOIDCClientV2NegTC_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2NegTC_With_Invalid_ClientName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2NegTC_With_Invalid_ClientName_Neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "/%invalidClientName%", "orgName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when an invalid client name is provided, uniqueIdentifier=TC_PMS_GetOIDCClientV2NegTC_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2NegTC_With_Invalid_PageNo_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2NegTC_With_Invalid_PageNo_Neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "abc", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$" }, output={ "responseCode": "400" }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when an invalid page number is provided, uniqueIdentifier=TC_PMS_GetOIDCClientV2NegTC_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2NegTC_With_Invalid_PageSize_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2NegTC_With_Invalid_PageSize_Neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "%abc/", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$" }, output={ "responseCode": "400" }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when an invalid page size is provided, uniqueIdentifier=TC_PMS_GetOIDCClientV2NegTC_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2NegTC_With_Invalid_PartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2NegTC_With_Invalid_PartnerId_Neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "%/invalidPartnerId<>", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when an invalid Partner ID is provided, uniqueIdentifier=TC_PMS_GetOIDCClientV2NegTC_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2NegTC_With_Invalid_PolicyGroupName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2NegTC_With_Invalid_PolicyGroupName_Neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "%/invalidPolicyGroupName{}", "policyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when an invalid policy group name is provided, uniqueIdentifier=TC_PMS_GetOIDCClientV2NegTC_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2NegTC_With_Invalid_PolicyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2NegTC_With_Invalid_PolicyName_Neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "/%invalidPolicyName[]", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when an invalid policy name is provided, uniqueIdentifier=TC_PMS_GetOIDCClientV2NegTC_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2NegTC_With_Invalid_SortFieldName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2NegTC_With_Invalid_SortFieldName_Neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "sortFieldName": "/%invalidSortFieldName*", "sortType": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when an invalid sort field name is provided, uniqueIdentifier=TC_PMS_GetOIDCClientV2NegTC_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2NegTC_With_Invalid_SortType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2NegTC_With_Invalid_SortType_Neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "sortFieldName": "partnerId", "sortType": "%123invalid/", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when an invalid sort type is provided, uniqueIdentifier=TC_PMS_GetOIDCClientV2NegTC_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2NegTC_With_Invalid_Status_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2NegTC_With_Invalid_Status_Neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "%invalid/" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when an invalid status is provided, uniqueIdentifier=TC_PMS_GetOIDCClientV2NegTC_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2NegTC_With_Invalid_orgName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2NegTC_With_Invalid_orgName_Neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "/%invalidOrgName%", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when an invalid organization name is provided, uniqueIdentifier=TC_PMS_GetOIDCClientV2NegTC_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2NegTC_With_PageNo_Without_PageSize_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2NegTC_With_PageNo_Without_PageSize_Neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "0", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when a page number is provided without specifying the page size, uniqueIdentifier=TC_PMS_GetOIDCClientV2NegTC_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientV2NegTC_With_Valid_SortType_And_Without_SortFieldName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientV2NegTC_With_Valid_SortType_And_Without_SortFieldName_Neg, endPoint=/v1/partnermanager/oidc-clients, role=partnerauth, templateFields=null, input={ "clientName": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "asc", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClient/GetOIDCClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when a valid sort type is provided but the sort field name is missing, uniqueIdentifier=TC_PMS_GetOIDCClientV2NegTC_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientByClientIdV2_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientByClientIdV2_All_Valid_Smoke, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$" }, output={ }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClientByClientId/GetOIDCClientByClientId, outputTemplate=pms/OIDCClientEnhancement/GetOIDCClientByClientId/GetOIDCClientByClientIdResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client details can be retrieved successfully using a valid client ID, uniqueIdentifier=TC_PMS_GetOIDCClientByClientIdV2_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientByClientIdV2_With_Deactivated_ClientId |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientByClientIdV2_With_Deactivated_ClientId, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "clientId": "$ID:CreateOIDCClient_all_ValidName_Smoke_sid_clientId$" }, output={ }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClientByClientId/GetOIDCClientByClientId, outputTemplate=pms/OIDCClientEnhancement/GetOIDCClientByClientId/GetOIDCClientByClientIdResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when the client ID is deactivated, uniqueIdentifier=TC_PMS_GetOIDCClientByClientIdV2_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientByClientIdV2_With_Partner_Admin_Role |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientByClientIdV2_With_Partner_Admin_Role, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partneradmin, templateFields=null, input={ "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$" }, output={ }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClientByClientId/GetOIDCClientByClientId, outputTemplate=pms/OIDCClientEnhancement/GetOIDCClientByClientId/GetOIDCClientByClientIdResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client details can be retrieved using a valid client ID by a user with the Partner Admin role, uniqueIdentifier=TC_PMS_GetOIDCClientByClientIdV2_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientByClientIdV2NegTC_With_ClientId_Null_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientByClientIdV2NegTC_With_ClientId_Null_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "clientId": "null" }, output={ "errors": [ { "errorCode": "PMS_ESI_004" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClientByClientId/GetOIDCClientByClientId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when the client ID is null, uniqueIdentifier=TC_PMS_GetOIDCClientByClientIdV2NegTC_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientByClientIdV2NegTC_With_Different_Partner_Role_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientByClientIdV2NegTC_With_Different_Partner_Role_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerdevice, templateFields=null, input={ "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClientByClientId/GetOIDCClientByClientId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when accessed by a user with a different partner role, uniqueIdentifier=TC_PMS_GetOIDCClientByClientIdV2NegTC_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientByClientIdV2NegTC_With_Invalid_Access_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientByClientIdV2NegTC_With_Invalid_Access_Token_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=invalidtoken, templateFields=null, input={ "clientId": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClientByClientId/GetOIDCClientByClientId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details by client ID fails when an invalid access token is used, uniqueIdentifier=TC_PMS_GetOIDCClientByClientIdV2NegTC_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientByClientIdV2NegTC_With_Invalid_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientByClientIdV2NegTC_With_Invalid_ClientId_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "clientId": "invalidclientId" }, output={ "errors": [ { "errorCode": "PMS_ESI_004" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClientByClientId/GetOIDCClientByClientId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when an invalid client ID is provided, uniqueIdentifier=TC_PMS_GetOIDCClientByClientIdV2NegTC_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOIDCClientByClientIdV2NegTC_With_SpecialCharacter_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOIDCClientByClientIdV2NegTC_With_SpecialCharacter_ClientId_Neg, endPoint=/v1/partnermanager/oidc-clients/{clientId}, role=partnerauth, templateFields=null, input={ "clientId": "@ClientId" }, output={ "errors": [ { "errorCode": "PMS_PRT_099" } ] }, inputTemplate=pms/OIDCClientEnhancement/GetOIDCClientByClientId/GetOIDCClientByClientId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC client details fails when the client ID contains special characters, uniqueIdentifier=TC_PMS_GetOIDCClientByClientIdV2NegTC_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateOIDCClient_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "ACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClient/oIDCClientUpdate, outputTemplate=pms/OIDCClient/oIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that an OIDC client is updated successfully with all required valid inputs as part of a smoke test, uniqueIdentifier=TC_PMS_UpdateOIDCClient_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllOidcClient_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllOidcClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/GetAllOidcClient/getAllOidcClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all OIDC clients are successfully retrieved when a valid request with proper authorization is made, uniqueIdentifier=TC_PMS_GetAllOidcClient_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllOidcClient_Invalid_Auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllOidcClient_Invalid_Auth, endPoint=/v1/partnermanager/oauth/client, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC clients fails when an invalid authorization token is provided, uniqueIdentifier=TC_PMS_GetAllOidcClient_dummyauth_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllOidcClient_without_Auth |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllOidcClient_without_Auth, endPoint=/v1/partnermanager/oauth/client, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving OIDC clients fails when the request is made without an authorization token, uniqueIdentifier=TC_PMS_GetAllOidcClient_noauth_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClient_Missing_Requesttime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClient_Missing_Requesttime_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_ForNeg_all_Valid_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when the request time is missing, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClient_Missing_clientAuthMethods_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClient_Missing_clientAuthMethods_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_ForNeg_all_Valid_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": $REMOVE$, "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}] }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when client authentication methods are missing, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClient_Missing_clientNameLangMap_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClient_Missing_clientNameLangMap_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when the client name language map is missing, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClient_Missing_clientName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClient_Missing_clientName_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when the client name is missing, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClient_Missing_client_id_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClient_Missing_client_id_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "client_id": " ", "requesttime": "$TIMESTAMP$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_099" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when the client ID is missing, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClient_Missing_grantTypes_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClient_Missing_grantTypes_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_ForNeg_all_Valid_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "grantTypes": $REMOVE$, "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when grant types are missing, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClient_Missing_logoUri_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClient_Missing_logoUri_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when the logo URI is missing, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClient_Missing_redirectUris_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClient_Missing_redirectUris_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when redirect URIs are missing, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClient_Missing_status_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClient_Missing_status_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that OIDC client deactivation fails when the status is missing, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClient_Retry_with_Deactivated_ClientId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClient_Retry_with_Deactivated_ClientId_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_ESI_008" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that deactivation fails when retrying with an already deactivated OIDC client ID, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateOIDCClient_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "INACTIVE" }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the OIDC client is successfully deactivated when all inputs are valid, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllOidcClient_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllOidcClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/GetAllOidcClient/getAllOidcClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all OIDC clients are successfully retrieved when a valid request with proper authorization is made, uniqueIdentifier=TC_PMS_GetAllOidcClient_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_GetConfiguration_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Partner_GetConfiguration_allValid_smoke, endPoint=/v1/partnermanager/system-config, role=partner, templateFields=null, input={ }, output={ "grantTypes": "authorization_code", "axiosTimeout": "3", "inActivityTimer": "25", "inActivityPromptTimer": "5", "clientAuthMethods": "private_key_jwt" }, inputTemplate=pms/GetConfiguration/GetConfiguration, outputTemplate=pms/GetConfiguration/GetConfigurationResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all partner configurations are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetConfiguration_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetUserConsent_before_consent_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetUserConsent_before_consent_given, endPoint=/v1/partnermanager/users/user-consent, role=partnerauth, templateFields=null, input={ }, output={ "userId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$" }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/GetUserConsent/GetUserConsentResultBeforeConsent, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that no consent status is returned for a user who has not yet given consent, uniqueIdentifier=TC_pms_GetUserConsent_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_saveUserConsent_AllValid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostWithoutBody |
| Testcase Input |
| testCaseName=Pms_saveUserConsent_AllValid_Smoke, endPoint=/v1/partnermanager/users/user-consent, role=partnerauth, templateFields=null, input={ }, output={ "userId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$" }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/SaveUserConsent/SaveUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that user consent can be saved successfully with all valid inputs, uniqueIdentifier=TC_PMS_saveUserConsent_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_saveUserConsent_With_PartnerAdmin_Role |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostWithoutBody |
| Testcase Input |
| testCaseName=Pms_saveUserConsent_With_PartnerAdmin_Role, endPoint=/v1/partnermanager/users/user-consent, role=partneradmin, templateFields=null, input={ }, output={ "userId": "$RUNCONTEXT$pms-111777" }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/SaveUserConsent/SaveUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a user consent can be saved successfully when the user has the Partner Admin role, uniqueIdentifier=TC_PMS_saveUserConsent_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_saveUserConsent_invalid_roles_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostWithoutBody |
| Testcase Input |
| testCaseName=Pms_saveUserConsent_invalid_roles_Neg, endPoint=/v1/partnermanager/users/user-consent, role=ftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that saving user consent fails when the user has invalid roles, uniqueIdentifier=TC_PMS_saveUserConsent_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_saveUserConsent_invalid_user_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostWithoutBody |
| Testcase Input |
| testCaseName=Pms_saveUserConsent_invalid_user_Neg, endPoint=/v1/partnermanager/users/user-consent, role=partnerauthexternal, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that saving user consent fails when an invalid user is provided, uniqueIdentifier=TC_PMS_saveUserConsent_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_saveUserConsent_without_authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostWithoutBody |
| Testcase Input |
| testCaseName=Pms_saveUserConsent_without_authentication_Neg, endPoint=/v1/partnermanager/users/user-consent, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that saving user consent fails when authentication details are missing, uniqueIdentifier=TC_PMS_saveUserConsent_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetUserConsent_Get_consent_status_invalid_auth_token_neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetUserConsent_Get_consent_status_invalid_auth_token_neg, endPoint=/v1/partnermanager/users/user-consent, role=ftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving user consent status fails when an invalid token is provided, uniqueIdentifier=TC_pms_GetUserConsent_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetUserConsent_Get_consent_status_invalid_user_neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetUserConsent_Get_consent_status_invalid_user_neg, endPoint=/v1/partnermanager/users/user-consent, role=partnerauthexternal, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving user consent status fails when an invalid user ID is provided, uniqueIdentifier=TC_pms_GetUserConsent_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetUserConsent_Get_consent_status_without_access_token_neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetUserConsent_Get_consent_status_without_access_token_neg, endPoint=/v1/partnermanager/users/user-consent, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving user consent status fails when no access token is provided, uniqueIdentifier=TC_pms_GetUserConsent_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetUserConsent_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetUserConsent_allValid_smoke, endPoint=/v1/partnermanager/users/user-consent, role=partnerauth, templateFields=null, input={ }, output={ "userId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$" }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/GetUserConsent/GetUserConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all user consent records are retrieved successfully for a valid request, uniqueIdentifier=TC_pms_GetUserConsent_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_DeviceProvider_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_DeviceProvider_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerdevice, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$" }, output={ }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificatesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all original partner certificates for device providers are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_getPartner_certificate_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_FTMProvider_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_FTMProvider_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerftm, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$" }, output={ }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificatesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all original partner certificates are retrieved successfully for a valid FTM Provider request, uniqueIdentifier=TC_PMS_getPartner_certificate_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerauth, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$" }, output={ }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificatesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify that all original partner certificates are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_getPartner_certificate_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_invalid_roles_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_invalid_roles_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerdevice, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$" }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_007" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving partner certificates fails when the user has invalid, uniqueIdentifier=TC_PMS_getPartner_certificate_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_random_partnerid_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_random_partnerid_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partneradmin, templateFields=null, input={ "partnerId": "xyz12345abcdef" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving partner certificates fails when a random partner ID is provided, uniqueIdentifier=TC_PMS_getPartner_certificate_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_without_authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_without_authentication_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=invalidtoken, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving partner certificates fails when no authentication is provided, uniqueIdentifier=TC_PMS_getPartner_certificate_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_without_partnerid_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_without_partnerid_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partneradmin, templateFields=null, input={ "partnerId": "" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving partner certificates fails when the partner ID is not provided, uniqueIdentifier=TC_PMS_getPartner_certificate_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_MispLicense_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_MispLicense_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "$RUNCONTEXT$mis2p@gmail.com", "organizationName": "$RUNCONTEXT$MISP2-AUTOMATION", "partnerId": "$RUNCONTEXT$MISP2-AUTOMATION", "partnerType": "MISP_Partner", "policyGroup": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$RUNCONTEXT$MISP2-AUTOMATION", "status": "InProgress" }, inputTemplate=pms/mispPartner/CreatePartner/createPartner, outputTemplate=pms/mispPartner/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP license can be successfully registered through partner self registration with all required valid inputs as part of a smoke test, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_misp_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_MispLicense_Msip_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_MispLicense_Msip_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "90110300", "emailId": "$RUNCONTEXT$mis3p@gmail.com", "organizationName": "$RUNCONTEXT$MISP3", "partnerId": "$RUNCONTEXT$MISP3", "partnerType": "MISP_Partner", "policyGroup": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$RUNCONTEXT$MISP3", "status": "InProgress" }, inputTemplate=pms/mispPartner/CreatePartner/createPartner, outputTemplate=pms/mispPartner/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP license can be successfully registered via MSIP through partner self registration as part of a smoke test, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_misp_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerSelfRegistration_MispPartner_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_PartnerSelfRegistration_MispPartner_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "$RUNCONTEXT$oldmisp@gmail.com", "organizationName": "$RUNCONTEXT$MISP-AUTOMATION", "partnerId": "$RUNCONTEXT$MISP-AUTOMATION", "partnerType": "MISP_Partner", "policyGroup": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "$RUNCONTEXT$MISP-AUTOMATION", "status": "InProgress" }, inputTemplate=pms/mispPartner/CreatePartner/createPartner, outputTemplate=pms/mispPartner/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP partner can successfully complete self registration with all required valid inputs as part of a smoke test, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_misp__01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_Misp2_Automation_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_Misp2_Automation_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPCACERT$", "partnerId": "$ID:PartnerSelfRegistration_MispLicense_All_Valid_Smoke_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/mispPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/mispPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid CA certificate for Misp Partner - MISP2-AUTOMATION, uniqueIdentifier=TC_PMS_uploadcaCertMisp_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_Misp3_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_Misp3_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPCACERT$", "partnerId": "$ID:PartnerSelfRegistration_MispLicense_Msip_Smoke_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/mispPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/mispPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid CA certificate for Misp Partner - MISP3, uniqueIdentifier=TC_PMS_uploadcaCertMisp_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCACertificate_Misp_Automation_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCACertificate_Misp_Automation_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPCACERT$", "partnerId": "$ID:PartnerSelfRegistration_MispPartner_All_Valid_Smoke_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/mispPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/mispPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a CA certificate is uploaded successfully with all required valid inputs, as part of a smoke test, uniqueIdentifier=TC_PMS_uploadcaCertMisp_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadSUBCACertificate_Misp2_Automation_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadSUBCACertificate_Misp2_Automation_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPINTERCERT$", "partnerId": "$ID:PartnerSelfRegistration_MispLicense_All_Valid_Smoke_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/mispPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/mispPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid SUBCA certificate for Misp Partner - MISP2-AUTOMATION, uniqueIdentifier=TC_PMS_uploadsubcaCertMisp_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadSUBCACertificate_Misp3_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadSUBCACertificate_Misp3_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPINTERCERT$", "partnerId": "$ID:PartnerSelfRegistration_MispLicense_Msip_Smoke_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/mispPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/mispPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid SUBCA certificate for Misp Partner - MISP3, uniqueIdentifier=TC_PMS_uploadsubcaCertMisp_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadSUBCACertificate_Misp_Automation_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadSUBCACertificate_Misp_Automation_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "certificateData": "$MISPINTERCERT$", "partnerId": "$ID:PartnerSelfRegistration_MispPartner_All_Valid_Smoke_sid_partnerId$" }, output= { "status": "Upload Success." }, inputTemplate=pms/mispPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/mispPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a Sub-CA certificate is uploaded successfully with all required valid inputs as part of a smoke test, uniqueIdentifier=TC_PMS_uploadsubcaCertMisp_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCert_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_MispPartner_All_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/mispPartner/UploadCert/uploadCert, outputTemplate=pms/mispPartner/UploadCert/uploadCertResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that certificates are uploaded successfully with all required valid inputs as part of a smoke test, uniqueIdentifier=TC_PMS_UploadMispPartnerCert_01, additionalDependencies=TC_PMS_uploadcaCertMisp_01, TC_PMS_uploadsubcaCertMisp_02 |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCert_MispLicense_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCert_MispLicense_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_MispLicense_All_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/mispPartner/UploadCert/uploadCert, outputTemplate=pms/mispPartner/UploadCert/uploadCertResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP license certificate is uploaded successfully with all required valid inputs as part of a smoke test, uniqueIdentifier=TC_PMS_UploadMispPartnerCert_02, additionalDependencies=TC_PMS_uploadcaCertMisp_03, TC_PMS_uploadsubcaCertMisp_04 |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCert_MispLicense_MISP3_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCert_MispLicense_MISP3_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "certificateData": "$MISPPARTNERCERT$", "partnerId": "$ID:PartnerSelfRegistration_MispLicense_Msip_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/mispPartner/UploadCert/uploadCert, outputTemplate=pms/mispPartner/UploadCert/uploadCertResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP3 license certificate is uploaded successfully with all required valid inputs as part of a smoke test, uniqueIdentifier=TC_PMS_UploadMispPartnerCert_03, additionalDependencies=TC_PMS_uploadcaCertMisp_05, TC_PMS_uploadsubcaCertMisp_06 |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartner_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_MispPartner_All_Valid_Smoke_sid_partnerId$" }, output= { "partnerID": "$ID:PartnerSelfRegistration_MispPartner_All_Valid_Smoke_sid_partnerId$" }, inputTemplate=pms/mispPartner/GetPartner/getPartner, outputTemplate=pms/mispPartner/GetPartner/getPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner details are retrieved successfully with all required valid parameters as part of a smoke test, uniqueIdentifier=TC_PMS_getPartnerCert_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartner_MISP3_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartner_MISP3_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_MispLicense_Msip_Smoke_sid_partnerId$" }, output= { "partnerID": "$ID:PartnerSelfRegistration_MispLicense_Msip_Smoke_sid_partnerId$" }, inputTemplate=pms/mispPartner/GetPartner/getPartner, outputTemplate=pms/mispPartner/GetPartner/getPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that MISP3 partner details are retrieved successfully with all required valid parameters, as part of a smoke test, uniqueIdentifier=TC_PMS_getPartnerCert_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerCert_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_MispPartner_All_Valid_Smoke_sid_partnerId$" }, output= { }, inputTemplate=pms/mispPartner/GetCertificate/getCert, outputTemplate=pms/mispPartner/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner certificates are retrieved successfully with all required valid parameters, as part of a smoke test, uniqueIdentifier=TC_PMS_getMispPartnerCert_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToSaveDeviceDetail_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_ServiceToSaveDeviceDetail_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "deviceSubTypeCode": "Slap", "deviceTypeCode": "Finger", "id": "$RUNCONTEXT$device-id-123", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ } }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/device/makeAndModel/create/createDeviceDetailResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details are successfully saved with all valid inputs, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToSaveDeviceDetail_AlreadyExists_Invalid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_ServiceToSaveDeviceDetail_AlreadyExists_Invalid, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "deviceSubTypeCode": "Slap", "deviceTypeCode": "Finger", "id": "$REMOVE$", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_AUT_003" } ] }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that saving device details fails when the device already exists, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_DeviceId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_DeviceId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "deviceSubTypeCode": "Slab", "deviceTypeCode": "test", "id": "$REMOVE$", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_AUT_001" } ] }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that saving device details fails when the deviceId input parameter is missing, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_deviceProviderId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_deviceProviderId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "$REMOVE$", "deviceSubTypeCode": "Slab", "deviceTypeCode": "Finger", "id": "device-id-123", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that saving device details fails when the deviceProviderId input parameter is missing, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_deviceSubTypeCode |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_deviceSubTypeCode, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "deviceSubTypeCode": "$REMOVE$", "deviceTypeCode": "Finger", "id": "device-id-123", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that saving device details fails when the deviceSubTypeCode input parameter is missing, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_deviceTypeCode |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_deviceTypeCode, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "deviceSubTypeCode": "Slab", "deviceTypeCode": "$REMOVE$", "id": "device-id-123", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that saving device details fails when the deviceTypeCode input parameter is missing, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToSaveDeviceDetail_sameMakeModelType_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_ServiceToSaveDeviceDetail_sameMakeModelType_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "deviceSubTypeCode": "Single", "deviceTypeCode": "Finger", "id": "$RUNCONTEXT$device-id-124", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/device/makeAndModel/create/createDeviceDetailResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details are successfully saved when the make model and type are the same, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToSaveDeviceDetail_sameMakeModel_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_ServiceToSaveDeviceDetail_sameMakeModel_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "deviceSubTypeCode": "Single", "deviceTypeCode": "Iris", "id": "$REMOVE$", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/device/makeAndModel/create/createDeviceDetailResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details are successfully saved when the make and model are the same, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToSaveDeviceDetail_sameTypeSubType_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_ServiceToSaveDeviceDetail_sameTypeSubType_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "deviceSubTypeCode": "Slap", "deviceTypeCode": "Finger", "id": "$REMOVE$", "isItForRegistrationDevice": true, "make": "abcdef", "model": "FRO900000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/device/makeAndModel/create/createDeviceDetailResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details are successfully saved when the type and subtype are the same, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectDeviceDetail_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_RejectDeviceDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "De-activate", "id": "$ID:ServiceToSaveDeviceDetail_All_Valid_Smoke_sid_id$", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/device/makeAndModel/approve/approveDeviceDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details are successfully rejected with all valid inputs, uniqueIdentifier=TC_PMS_rejectDeviceDetail_01, additionalDependencies=TC_PMS_createServiceToSaveDeviceDetail_01 |
| Messages |
| Testcase Name |
|---|
| Pms_RejectDeviceDetail_Missing_InputParameter_approvalStatus |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_RejectDeviceDetail_Missing_InputParameter_approvalStatus, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "$REMOVE$", "id": "$ID:ServiceToSaveDeviceDetail_All_Valid_Smoke_sid_id$", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device detail rejection fails when the approvalStatus input parameter is missing, uniqueIdentifier=TC_PMS_rejectDeviceDetail_03, additionalDependencies=TC_PMS_createServiceToSaveDeviceDetail_01 |
| Messages |
| Testcase Name |
|---|
| Pms_RejectDeviceDetail_Missing_InputParameter_deviceId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_RejectDeviceDetail_Missing_InputParameter_deviceId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$REMOVE$", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device detail rejection fails when the deviceId input parameter is missing, uniqueIdentifier=TC_PMS_rejectDeviceDetail_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectDeviceDetail_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_RejectDeviceDetail_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "De-activate", "id": "$ID:ServiceToSaveDeviceDetail_sameMakeModelType_All_Valid_Smoke_sid_id$", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/device/makeAndModel/approve/approveDeviceDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details are successfully rejected with valid inputs, uniqueIdentifier=TC_PMS_rejectDeviceDetail_02, additionalDependencies=TC_PMS_createServiceToSaveDeviceDetail_02 |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveRejectDeviceDetail_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_ApproveRejectDeviceDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$ID:ServiceToSaveDeviceDetail_All_Valid_Smoke_sid_id$", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/device/makeAndModel/approve/approveDeviceDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details can be successfully approved or rejected with all valid inputs, uniqueIdentifier=TC_PMS_createApproveRejectDeviceDetail_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveRejectDeviceDetail_Missing_InputParameter_approvalStatus |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_ApproveRejectDeviceDetail_Missing_InputParameter_approvalStatus, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "$REMOVE$", "id": "$ID:ServiceToSaveDeviceDetail_All_Valid_Smoke_sid_id$", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device detail approval/rejection fails when the approvalStatus input parameter is missing, uniqueIdentifier=TC_PMS_createApproveRejectDeviceDetail_02, additionalDependencies=TC_PMS_createServiceToSaveDeviceDetail_01 |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveRejectDeviceDetail_Missing_InputParameter_deviceId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_ApproveRejectDeviceDetail_Missing_InputParameter_deviceId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$REMOVE$", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device detail approval/rejection fails when the deviceId input parameter is missing, uniqueIdentifier=TC_PMS_createApproveRejectDeviceDetail_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToUpdateDeviceDetail_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_ServiceToUpdateDeviceDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "Tech-123", "deviceSubTypeCode": "Slap", "deviceTypeCode": "Finger", "id": "$ID:ServiceToSaveDeviceDetail_All_Valid_Smoke_sid_id$", "isActive": true, "isItForRegistrationDevice": true, "make": "abcdef", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/device/makeAndModel/update/updateDeviceDetailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details are successfully updated with all valid inputs, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_DeviceId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_DeviceId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "Tech-123", "deviceSubTypeCode": "Slab", "deviceTypeCode": "Finger", "id": "$REMOVE$", "isActive": true, "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device detail update fails when the deviceId input parameter is missing, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_deviceProviderId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_deviceProviderId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "$REMOVE$", "deviceSubTypeCode": "Slab", "deviceTypeCode": "Finger", "id": "$ID:ServiceToSaveDeviceDetail_All_Valid_Smoke_sid_id$", "isActive": true, "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_AUT_001" } ] }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device detail update fails when the deviceProviderId input parameter is missing, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_deviceSubTypeCode |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_deviceSubTypeCode, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "Tech-123", "deviceSubTypeCode": "$REMOVE$", "deviceTypeCode": "Finger", "id": "$ID:ServiceToSaveDeviceDetail_All_Valid_Smoke_sid_id$", "isActive": true, "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device detail update fails when the deviceSubTypeCode input parameter is missing, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_deviceTypeCode |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_deviceTypeCode, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "Tech-123", "deviceSubTypeCode": "Slab", "deviceTypeCode": "$REMOVE$", "id": "$ID:ServiceToSaveDeviceDetail_All_Valid_Smoke_sid_id$", "isActive": true, "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device detail update fails when the deviceTypeCode input parameter is missing, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToUpdateDeviceDetail_afterReject_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_ServiceToUpdateDeviceDetail_afterReject_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "Tech-123", "deviceSubTypeCode": "Single", "deviceTypeCode": "Finger", "id": "$ID:ServiceToSaveDeviceDetail_sameMakeModelType_All_Valid_Smoke_sid_id$", "isActive": true, "isItForRegistrationDevice": true, "make": "abcdef", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/device/makeAndModel/update/updateDeviceDetailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details are successfully updated after rejection with all valid inputs, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceDetailsFilter_Invalid_Column_doesnt_exist |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceDetailsFilter_Invalid_Column_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "asff", "type": "all", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device detail filtering fails when the specified filter column does not exist, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceDetailsFilter_Invalid_EmptyFilterColumn |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceDetailsFilter_Invalid_EmptyFilterColumn, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "all", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device detail filtering fails when the filterColumn is empty, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceDetailsFilter_Invalid_EmptyFilterType |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceDetailsFilter_Invalid_EmptyFilterType, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device detail filtering fails when the filterType is empty, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceDetailsFilter_Invalid_type_doesnt_exist |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceDetailsFilter_Invalid_type_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "asdf", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device detail filtering fails when the specified filter type does not exist, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceDetailsFilter_To_MapSBI |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceDetailsFilter_To_MapSBI, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "unique", "text": "device-id-321" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details are correctly filtered for mapping to a Secure Biometric Interface, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceDetailsFilter_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceDetailsFilter_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "unique", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details are successfully filtered using valid criteria, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_01, additionalDependencies=TC_PMS_createServiceToSaveDeviceDetail_01 |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceDetailsFilter_all_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceDetailsFilter_all_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "all", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "fieldID": "id", "fieldCode": "device-id-123" }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all device details are successfully filtered with valid inputs, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_03, additionalDependencies=TC_PMS_createServiceToSaveDeviceDetail_01 |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceType_AllValid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceType_AllValid_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "active": "true" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device types can be searched successfully with all valid inputs, uniqueIdentifier=TC_PMS_createSearchDeviceType_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceType_Only_FilterCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceType_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "t" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "active": "true" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device types can be searched successfully using only filter criteria without sorting, uniqueIdentifier=TC_PMS_createSearchDeviceType_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceType_Only_PaginationCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceType_Only_PaginationCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "active": "true" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device types can be searched successfully using only pagination criteria without filters, uniqueIdentifier=TC_PMS_createSearchDeviceType_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceType_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceType_Smoke_sid, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "t" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "active": "true" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device types can be searched successfully with valid inputs, uniqueIdentifier=TC_PMS_createSearchDeviceType_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceType__Only_SortCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceType__Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "name", "sortType": "desc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "active": "true" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device types can be searched successfully using only sort criteria without filters, uniqueIdentifier=TC_PMS_createSearchDeviceType_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceType_with_invalid_sort_field |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceType_with_invalid_sort_field, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Touchless" } ], "sort": [ { "sortField": "mo@@@del", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-357" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching device types fails an error when an invalid sortField is provided, uniqueIdentifier=TC_PMS_createSearchDeviceType_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceType_with_invalid_sort_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceType_with_invalid_sort_type, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Touchless" } ], "sort": [ { "sortField": "code", "sortType": "dc" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching device types fails when an invalid sort type is provided, uniqueIdentifier=TC_PMS_createSearchDeviceType_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceType_with_missing_columnName |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceType_with_missing_columnName, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "$REMOVE$", "type": "equals", "value": "Touchless" } ], "sort": [ { "sortField": "code", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-311" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching device types fails when the sort column name is missing, uniqueIdentifier=TC_PMS_createSearchDeviceType_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceType_with_missing_sort_field |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceType_with_missing_sort_field, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Touchless" } ], "sort": [ { "sortField": "code", "sortType": "$REMOVE$" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate device type search behavior when the sortField parameter is missing, uniqueIdentifier=TC_PMS_createSearchDeviceType_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceType_with_missing_sort_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceType_with_missing_sort_type, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Touchless" } ], "sort": [ { "sortField": "code", "sortType": "$REMOVE$" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate device type search with missing sortType parameter, uniqueIdentifier=TC_PMS_createSearchDeviceType_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceType_with_missing_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceType_with_missing_type, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "$REMOVE$", "value": "Touchless" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-312" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching device types fails when the sort type ascending is missing, uniqueIdentifier=TC_PMS_createSearchDeviceType_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceDetails_AllValid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceDetails_AllValid_Smoke, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details can be searched successfully with all valid inputs, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceDetails_Only_FilterCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceDetails_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "id", "type": "equals", "value": "device-id-123" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details can be searched successfully using only filter criteria without sorting, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceDetails_Only_PaginationCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceDetails_Only_PaginationCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details can be searched successfully using only pagination criteria without filtering, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceDetails_Only_SortCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceDetails_Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "sort": [ { "sortField": "id", "sortType": "desc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details can be searched successfully using only sort criteria without filters, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceDetails_sort_type_desc_equals_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceDetails_sort_type_desc_equals_Smoke_sid, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "id", "type": "equals", "value": "device-id-123" } ], "sort": [ { "sortField": "id", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details can be searched and sorted successfully in descending order using valid inputs, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceDetails_with_invalid_columnName |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceDetails_with_invalid_columnName, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "mo@@@@@@@2334412345del", "type": "startswith", "value": "FACE01" } ], "sort": [ { "sortField": "model", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-310", "message": "Invalid column received : mo@@@@@@@2334412345del" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching device details fails when an invalid sort column name is provided, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceDetails_with_invalid_sort_field |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceDetails_with_invalid_sort_field, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "model", "type": "startswith", "value": "FACE01" } ], "sort": [ { "sortField": "mo@@@del", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-357", "message": "Invalid sort field mo@@@del" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching device details fails when an invalid sort field is provided, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceDetails_with_invalid_sort_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceDetails_with_invalid_sort_type, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "model", "type": "startswith", "value": "FACE01" } ], "sort": [ { "sortField": "model", "sortType": "dc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358", "message": "Sort type dc is not supported" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching device details fails when an invalid sort type is provided, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceDetails_with_missing_sort_field |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceDetails_with_missing_sort_field, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "model", "type": "startswith", "value": "FACE01" } ], "sort": [ { "sortField": "$REMOVE$", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314", "message": "Missing sort field or sort type values" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching device details fails when the sort field is missing, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceDetails_with_missing_sort_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceDetails_with_missing_sort_type, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "model", "type": "startswith", "value": "FACE01" } ], "sort": [ { "sortField": "model", "sortType": "$REMOVE$" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314", "message": "Missing sort field or sort type values" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching device details fails when the sort type is missing, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchDeviceDetails_with_missing_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchDeviceDetails_with_missing_type, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "model", "type": "$REMOVE$", "value": "FACE01" } ], "sort": [ { "sortField": "model", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-312", "message": "Filter type is missing" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching device details fails when the sort type descending is missing, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBIBeforeAddingSBI_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBIBeforeAddingSBI_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerdevice, templateFields=null, input={ }, output= { "pageNo": "0" }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIBeforAddingSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all SBIs existing before adding a new SBI are successfully retrieved when filtered by a valid SBI ID, uniqueIdentifier=TC_PMS_SBI_List_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerdevice, templateFields=null, input={ "swBinaryHash": "devicehaadsassh", "swVersion": "deviceswasdasd", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "providerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that secure biometric interface details can be created successfully by a device provider with all valid inputs, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SaveSecureBiometricInterfaceCreateDto_DeviceProvider_With_FTMPartner_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_SaveSecureBiometricInterfaceCreateDto_DeviceProvider_With_FTMPartner_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerdevice, templateFields=null, input={ "swBinaryHash": "sbi_ftmpartner_hash", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "sbi_ftmpartner_version", "providerId": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a device provider can create secure biometric interface details successfully when associated with an FTM partner, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SaveSecureBiometricInterface_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_SaveSecureBiometricInterface_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.01", "requesttime": "$TIMESTAMP$", "providerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that secure biometric interface details can be saved successfully with all valid inputs, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SaveSecureBiometricInterface_Missing_partnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_SaveSecureBiometricInterface_Missing_partnerId_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2222-12-30T08:23:57.986Z", "swVersion": "MO.TD.01", "requesttime": "$TIMESTAMP$", "providerId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that saving secure biometric interface fails when the partner ID is missing, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SaveSecureBiometricInterface_Missing_swVersion_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_SaveSecureBiometricInterface_Missing_swVersion_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2222-12-30T08:23:57.986Z", "swVersion": "$REMOVE$", "requesttime": "$TIMESTAMP$", "providerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that saving secure biometric interface fails when the software version is missing, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SaveSecureBiometricInterface_SpaceVal_partnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_SaveSecureBiometricInterface_SpaceVal_partnerId_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.01", "requesttime": "$TIMESTAMP$", "providerId": "pms- 111998" }, output={ "errors": [ { "errorCode": "PMS_AUT_002" } ] }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that saving secure biometric interface fails when the partner ID contains only spaces, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SaveSecureBiometricInterface_TO_Map_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_SaveSecureBiometricInterface_TO_Map_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.04", "requesttime": "$TIMESTAMP$", "providerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that secure biometric interface details can be saved successfully to enable mapping with valid inputs, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SaveSecureBiometricInterface_Valid_ForDeactivate_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_SaveSecureBiometricInterface_Valid_ForDeactivate_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.05", "requesttime": "$TIMESTAMP$", "providerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that secure biometric interface details can be saved successfully for deactivation with valid inputs, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SaveSecureBiometricInterface_Valid_Smoke_ForReject_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_SaveSecureBiometricInterface_Valid_Smoke_ForReject_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.03", "requesttime": "$TIMESTAMP$", "providerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that secure biometric interface details can be saved successfully for the reject flow with valid inputs, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SaveSecureBiometricInterface_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_SaveSecureBiometricInterface_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.02", "requesttime": "$TIMESTAMP$", "providerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that secure biometric interface details can be saved successfully with valid inputs, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SaveSecureBiometricInterface_dublicate_swVersion_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_SaveSecureBiometricInterface_dublicate_swVersion_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.01", "requesttime": "$TIMESTAMP$", "providerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$" }, output={ "errors": [ { "errorCode": "PMS_AUT_512" } ] }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that saving secure biometric interface fails when a duplicate software version is provided, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectSecureBiometricInterface_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_RejectSecureBiometricInterface_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "De-activate", "id": "$ID:SaveSecureBiometricInterface_Valid_Smoke_ForReject_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/SecureBiometricInterface/reject/rejectSecureBiometricInterface, outputTemplate=pms/device/SecureBiometricInterface/reject/rejectSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a Secure Biometric Interface is successfully rejected with all valid inputs, uniqueIdentifier=TC_PMS_RejectSecureBiometricInterface_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectSecureBiometricInterface_Missing_InputParameter_approvalStatus |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_RejectSecureBiometricInterface_Missing_InputParameter_approvalStatus, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "$REMOVE$", "id": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/SecureBiometricInterface/reject/rejectSecureBiometricInterface, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI rejection fails when the approvalStatus input parameter is missing, uniqueIdentifier=TC_PMS_RejectSecureBiometricInterface_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectSecureBiometricInterface_SpaVal_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_RejectSecureBiometricInterface_SpaVal_neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "De-activate", "id": "a0f2b0ca-92 66-4cf4-832c-7741d5b6a174", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/SecureBiometricInterface/reject/rejectSecureBiometricInterface, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI rejection fails when an invalid input is provided, uniqueIdentifier=TC_PMS_RejectSecureBiometricInterface_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveSecureBiometricInterface_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_ApproveSecureBiometricInterface_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "response": "Secure biometric details approved successfully." }, inputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterface, outputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a Secure Biometric Interface is successfully approved with all valid inputs, uniqueIdentifier=TC_PMS_ApproveSecureBiometricInterface_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveSecureBiometricInterface_Missing_InputParameter_approvalStatus |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_ApproveSecureBiometricInterface_Missing_InputParameter_approvalStatus, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "$REMOVE$", "id": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterface, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI approval fails when the approvalStatus input parameter is missing, uniqueIdentifier=TC_PMS_ApproveSecureBiometricInterface_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveSecureBiometricInterface_ToMap_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_ApproveSecureBiometricInterface_ToMap_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$ID:SaveSecureBiometricInterface_TO_Map_Smoke_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "response": "Secure biometric details approved successfully." }, inputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterface, outputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a Secure Biometric Interface is successfully approved and ready for mapping, uniqueIdentifier=TC_PMS_ApproveSecureBiometricInterface_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveSecureBiometricInterface_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_ApproveSecureBiometricInterface_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$ID:SaveSecureBiometricInterface_Valid_Smoke_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "response": "Secure biometric details approved successfully." }, inputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterface, outputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a Secure Biometric Interface is successfully approved with valid inputs, uniqueIdentifier=TC_PMS_ApproveSecureBiometricInterface_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateSecureBiometricInterface_AfterReject_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_UpdateSecureBiometricInterface_AfterReject_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterface_Valid_Smoke_ForReject_sid_id$", "approvalStatus": "Activate" }, output={ "errors": [ { "errorCode": "PMS_AUT_518" } ] }, inputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterface, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a Secure Biometric Interface fails after it has been rejected, uniqueIdentifier=TC_PMS_createUpdateSecureBiometricInterface_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateSecureBiometricInterface_DeviceProvider_AllValid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_UpdateSecureBiometricInterface_DeviceProvider_AllValid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "approvalStatus": "Activate" }, output={ "response": "Secure biometric details approved successfully." }, inputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterface, outputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate updating Secure Biometric Interface for a Device Provider with valid inputs succeeds, uniqueIdentifier=TC_PMS_createUpdateSecureBiometricInterface_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateSecureBiometricInterface_Missing_InputParameter_Id |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_UpdateSecureBiometricInterface_Missing_InputParameter_Id, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "id": "$REMOVE$", "approvalStatus": "Activate" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterface, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a Secure Biometric Interface fails when the id parameter is missing, uniqueIdentifier=TC_PMS_createUpdateSecureBiometricInterface_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateSecureBiometricInterface_ReApprove_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_UpdateSecureBiometricInterface_ReApprove_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "approvalStatus": "Activate" }, output={ "errors": [ { "errorCode": "PMS_AUT_517" } ] }, inputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterface, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that re approving a Secure Biometric Interface fails when not allowed, uniqueIdentifier=TC_PMS_createUpdateSecureBiometricInterface_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateSecureBiometricInterface_for_FTMPartner_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_UpdateSecureBiometricInterface_for_FTMPartner_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_With_FTMPartner_Smoke_sid_id$", "approvalStatus": "Activate" }, output={ "response": "Secure biometric details approved successfully." }, inputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterface, outputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a Secure Biometric Interface for an FTM Partner with valid inputs is successful, uniqueIdentifier=TC_PMS_createUpdateSecureBiometricInterface_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchSecureBiometric_AllValid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchSecureBiometric_AllValid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometric, outputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometricResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Secure Biometric records with all valid inputs returns the expected results successfully, uniqueIdentifier=TC_PMS_createSearchSecureBiometric_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchSecureBiometric_Only_FilterCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchSecureBiometric_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "providerId", "type": "equals", "value": "Tech-123" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometric, outputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometricResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Secure Biometric records using only filter criteria returns the expected results correctly, uniqueIdentifier=TC_PMS_createSearchSecureBiometric_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchSecureBiometric_Only_PaginationCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchSecureBiometric_Only_PaginationCriteria_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometric, outputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometricResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Secure Biometric records using only pagination criteria returns results correctly, uniqueIdentifier=TC_PMS_createSearchSecureBiometric_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchSecureBiometric_Only_SortCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchSecureBiometric_Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "swCreateDateTime", "sortType": "asc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometric, outputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometricResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Secure Biometric records using only sort criteria returns results correctly, uniqueIdentifier=TC_PMS_createSearchSecureBiometric_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchSecureBiometric_type_contains_Smoke_asc_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchSecureBiometric_type_contains_Smoke_asc_sid, endPoint=/v1/partnermanager/securebiometricinterface/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "providerId", "type": "equals", "value": "Tech-123" } ], "sort": [ { "sortField": "swCreateDateTime", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometric, outputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometricResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Secure Biometric records with type containing a value sorted ascending by sid returns correct results, uniqueIdentifier=TC_PMS_createSearchSecureBiometric_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApprovedDeviceProviderIds_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_allValid_smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=partnerdevice, templateFields=null, input={ }, output={ "partnerId": "$RUNCONTEXT$pms-111998" }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIdsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all approved device provider IDs are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviders_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApprovedDeviceProviderIds_Invalid_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_Invalid_Token_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving all approved device provider IDs fails when an invalid authentication token is provided, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApprovedDeviceProviderIds_Without_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_Without_Authentication_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving all approved device provider IDs fails when authentication is not provided, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApprovedDeviceProviderIds_with_Admin_roles_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_with_Admin_roles_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=device, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving all approved device provider IDs fails when the user has only admin roles, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApprovedDeviceProviderIds_without_partner_roles_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_without_partner_roles_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=device, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving all approved device provider IDs fails when the user does not have partner roles, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| PMS_UpdateSBIID_10_days_Valid_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| DBIntegration |
| Testcase Input |
| testCaseName=PMS_UpdateSBIID_10_days_Valid_smoke_Pos, endPoint=no endpoint, role=partnerdevice, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterface_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/UpdateSBIID10daysSBIExpiry, outputTemplate=pms/InsertDBData/UpdateSBIIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the SBI ID is successfully updated with a validity of 10 days when a valid request is submitted, uniqueIdentifier=TC_UpdateSBID_InsertQuery_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| PMS_UpdateSBIID_15_days_Valid_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| DBIntegration |
| Testcase Input |
| testCaseName=PMS_UpdateSBIID_15_days_Valid_smoke_Pos, endPoint=no endpoint, role=partnerdevice, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/UpdateSBIID15daysSBIExpiry, outputTemplate=pms/InsertDBData/UpdateSBIIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the SBI ID is successfully updated with a validity of 15 days when a valid request is submitted, uniqueIdentifier=TC_UpdateSBID_InsertQuery_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| PMS_UpdateSBIID_30_days_Valid_smoke_Pos |
| Testcase Dependency |
| [] |
| Class Name |
| DBIntegration |
| Testcase Input |
| testCaseName=PMS_UpdateSBIID_30_days_Valid_smoke_Pos, endPoint=no endpoint, role=partnerdevice, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/UpdateSBIID, outputTemplate=pms/InsertDBData/UpdateSBIIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the SBI ID is successfully updated with a validity of 30 days when a valid request is submitted, uniqueIdentifier=TC_UpdateSBID_InsertQuery_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetSbiDetailsList_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetSbiDetailsList_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerdevice, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/GetSbiDetailsList/GetAllSbiDetailsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all SBI details are retrieved successfully for a valid request, uniqueIdentifier=TC_pms_GetSbiDetailsList_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetSbiDetailsList_get_partners_sbi_detail_API_with_Admin_roles_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetSbiDetailsList_get_partners_sbi_detail_API_with_Admin_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=regproc, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving a partner’s SBI details fails when accessed with an admin role instead of a partner role, uniqueIdentifier=TC_pms_GetSbiDetailsList_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetSbiDetailsList_get_response_Auth_Partner_roles_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetSbiDetailsList_get_response_Auth_Partner_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving SBI details fails when authentication is provided but the user has an invalid or unauthorized partner role, uniqueIdentifier=TC_pms_GetSbiDetailsList_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetSbiDetailsList_get_response_ftm_Partner_roles_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetSbiDetailsList_get_response_ftm_Partner_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving SBI details fails when the user has an FTM partner role instead of the required partner role, uniqueIdentifier=TC_pms_GetSbiDetailsList_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetSbiDetailsList_get_response_without_Partner_roles_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetSbiDetailsList_get_response_without_Partner_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=ftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving SBI details fails when the user does not have the required partner role, uniqueIdentifier=TC_pms_GetSbiDetailsList_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetSbiDetailsList_get_response_without_authorization_token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetSbiDetailsList_get_response_without_authorization_token_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving SBI details fails when no authorization token is provided, uniqueIdentifier=TC_pms_GetSbiDetailsList_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceTypeFilter_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceTypeFilter_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "all", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "code", "fieldValue": "Finger", "fieldCode": "Finger" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device types are successfully filtered with all valid inputs, uniqueIdentifier=TC_PMS_DeviceTypeFilter_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceTypeFilter_Invalid_Column_doesnt_exist |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceTypeFilter_Invalid_Column_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "asdf", "type": "unique", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device type filtering fails when the specified filter column does not exist, uniqueIdentifier=TC_PMS_DeviceTypeFilter_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceTypeFilter_Invalid_EmptyFilterColumn |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceTypeFilter_Invalid_EmptyFilterColumn, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "unique", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device type filtering fails when the filterColumn is empty, uniqueIdentifier=TC_PMS_DeviceTypeFilter_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceTypeFilter_Invalid_EmptyFilterType |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceTypeFilter_Invalid_EmptyFilterType, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device type filtering fails when the filterType is empty, uniqueIdentifier=TC_PMS_DeviceTypeFilter_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceTypeFilter_Invalid_type_doesnt_exist |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceTypeFilter_Invalid_type_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "asdf", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device type filtering fails when the specified filter type does not exist, uniqueIdentifier=TC_PMS_DeviceTypeFilter_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceSubTypeFilter_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceSubTypeFilter_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partnerdevice, templateFields=null, input={ "filters": [{ "columnName": "deviceType", "type": "unique", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "deviceType", "fieldValue": "Finger", "fieldCode": "Single" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device subtypes are successfully filtered with all valid inputs, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceSubTypeFilter_ColumnCode_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceSubTypeFilter_ColumnCode_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "all", "text": "Single" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device subtypes are successfully filtered using the column code with valid inputs, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceSubTypeFilter_Invalid_Column_doesnt_exist |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceSubTypeFilter_Invalid_Column_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "asdf", "type": "all", "text": "Single" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device subtype filtering fails when the specified filter column does not exist, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceSubTypeFilter_Invalid_EmptyFilterColumn |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceSubTypeFilter_Invalid_EmptyFilterColumn, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "all", "text": "Single" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device subtype filtering fails when the filterColumn is empty, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceSubTypeFilter_Invalid_EmptyFilterType |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceSubTypeFilter_Invalid_EmptyFilterType, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "", "text": "Single" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device subtype filtering fails when the filterType is empty, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeviceSubTypeFilter_Invalid_type_doesnt_exist |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_DeviceSubTypeFilter_Invalid_type_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "asfdg", "text": "Single" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device subtype filtering fails when the specified filter type does not exist, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SaveDeviceDetails_DeviceProviderForDeactivate_AllValid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_SaveDeviceDetails_DeviceProviderForDeactivate_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "make": "AcmeCorpDeactivate", "model": "X1000Deactivate", "requestTime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/SaveDeviceDetails/SaveDeviceDetails, outputTemplate=pms/SaveDeviceDetails/SaveDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details can be saved successfully by a device provider for deactivation with all valid inputs, uniqueIdentifier=TC_PMS_SaveDeviceDetails_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SaveDeviceDetails_DeviceProviderForPendingApproval_AllValid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_SaveDeviceDetails_DeviceProviderForPendingApproval_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "make": "AcmeCorpApprovalPending", "model": "X1000ApprovalPending", "requestTime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/SaveDeviceDetails/SaveDeviceDetails, outputTemplate=pms/SaveDeviceDetails/SaveDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details can be saved successfully by a device provider for pending approval with all valid inputs, uniqueIdentifier=TC_PMS_SaveDeviceDetails_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "make": "AcmeCorpReject", "model": "X1000Reject", "requestTime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/SaveDeviceDetails/SaveDeviceDetails, outputTemplate=pms/SaveDeviceDetails/SaveDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details can be saved successfully by a device provider for rejection flow with all valid inputs, uniqueIdentifier=TC_PMS_SaveDeviceDetails_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParamsAndAutoGenId |
| Testcase Input |
| testCaseName=Pms_SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "make": "AcmeCorp", "model": "X1000", "requestTime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/SaveDeviceDetails/SaveDeviceDetails, outputTemplate=pms/SaveDeviceDetails/SaveDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device details can be saved successfully by a device provider with all valid inputs, uniqueIdentifier=TC_PMS_SaveDeviceDetails_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all SBIs are successfully retrieved when a valid SBI ID is provided, uniqueIdentifier=TC_PMS_SBI_List_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_Filter_Expiry_Period_10_days |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_Filter_Expiry_Period_10_days, endPoint=/v1/partnermanager/securebiometricinterface?expiryPeriod={expiryPeriod}, role=partnerdevice, templateFields=null, input={ "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "10" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs expiring within 10 days are successfully retrieved, uniqueIdentifier=TC_PMS_SBI_List_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_Filter_Expiry_Period_15_days |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_Filter_Expiry_Period_15_days, endPoint=/v1/partnermanager/securebiometricinterface?expiryPeriod={expiryPeriod}, role=partnerdevice, templateFields=null, input={ "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "15" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs expiring within 15 days are successfully retrieved, uniqueIdentifier=TC_PMS_SBI_List_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_Filter_Expiry_Period_30_days_Sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_Filter_Expiry_Period_30_days_Sid, endPoint=/v1/partnermanager/securebiometricinterface?expiryPeriod={expiryPeriod}, role=partnerdevice, templateFields=null, input={ "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "30" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs expiring within 30 days are successfully retrieved when filtered by a valid SBI ID, uniqueIdentifier=TC_PMS_SBI_List_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_Partner_device_token |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_Partner_device_token, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerdevice, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs are successfully retrieved for a partner when a valid device token is provided, uniqueIdentifier=TC_PMS_SBI_List_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_orgName_valid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_orgName_valid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "orgName": "1", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiId": "$REMOVE$", "sbiVersion": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs are successfully retrieved when filtered by a valid orgName, uniqueIdentifier=TC_PMS_SBI_List_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_pagesize_given_valid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_pagesize_given_valid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "pageSize": "12", "sbiVersion": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "10" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs are successfully retrieved when a valid page size is specified, uniqueIdentifier=TC_PMS_SBI_List_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_partnerId_valid_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_partnerId_valid_sid, endPoint=/v1/partnermanager/securebiometricinterface?partnerId={partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "orgName": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiId": "$REMOVE$", "sbiVersion": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs are successfully retrieved when filtered by a valid partnerId and SBI ID, uniqueIdentifier=TC_PMS_SBI_List_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_random_value_given_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_random_value_given_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "partnerId": "^&&%%%", "orgName": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiId": "$REMOVE$", "sbiVersion": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI retrieval fails when a random or invalid SBI ID is provided, uniqueIdentifier=TC_PMS_SBI_List_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_sbiExpiryStatus_expired |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_sbiExpiryStatus_expired, endPoint=/v1/partnermanager/securebiometricinterface?sbiExpiryStatus={sbiExpiryStatus}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "expired", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs with expiry status Expired are successfully retrieved, uniqueIdentifier=TC_PMS_SBI_List_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_sbiExpiryStatus_valid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_sbiExpiryStatus_valid, endPoint=/v1/partnermanager/securebiometricinterface?sbiExpiryStatus={sbiExpiryStatus}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "valid", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs with expiry status Valid are successfully retrieved, uniqueIdentifier=TC_PMS_SBI_List_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_sbiVersion_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_sbiVersion_given, endPoint=/v1/partnermanager/securebiometricinterface?sbiVersion={sbiVersion}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiId": "$REMOVE$", "sbiVersion": "abcd", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs are successfully retrieved when filtered by a valid SBI version, uniqueIdentifier=TC_PMS_SBI_List_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_sortType_ASC |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_sortType_ASC, endPoint=/v1/partnermanager/securebiometricinterface?sortType={sortType}&sortFieldName={sortFieldName}&pageNo={pageNo}&pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "status", "sortType": "ASC", "pageNo": "0", "pageSize": "5", "sbiId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs are successfully retrieved in ascending order when sorted by a valid sortType, uniqueIdentifier=TC_PMS_SBI_List_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_sortType_DESC |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_sortType_DESC, endPoint=/v1/partnermanager/securebiometricinterface?sortType={sortType}&sortFieldName={sortFieldName}&pageNo={pageNo}&pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "status", "sortType": "DESC", "pageNo": "0", "pageSize": "5", "sbiId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs are successfully retrieved in descending order when sorted by a valid sortType, uniqueIdentifier=TC_PMS_SBI_List_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_status_approved_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_status_approved_sid, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "approved", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs with status Approved are successfully retrieved when filtered by a valid SBI ID, uniqueIdentifier=TC_PMS_SBI_List_32, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_status_deactivated |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_status_deactivated, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "deactivated", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs with status Deactivated are successfully retrieved, uniqueIdentifier=TC_PMS_SBI_List_31, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_status_pending_approval_sid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_status_pending_approval_sid, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_approval", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs with status Pending Approval are successfully retrieved when filtered by a valid SBI ID, uniqueIdentifier=TC_PMS_SBI_List_30, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_status_rejected |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParamForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_status_rejected, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "rejected", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBIs with status Rejected are successfully retrieved, uniqueIdentifier=TC_PMS_SBI_List_33, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToFilterSBI_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_ServiceToFilterSBI_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "providerId", "type": "all" }], "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all Secure Biometric Interfaces are successfully filtered with all valid inputs, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToFilterSBI_InValid_Column_doesnt_exist |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_ServiceToFilterSBI_InValid_Column_doesnt_exist, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "asrfg", "type": "all" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI filtering fails when the specified column does not exist, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToFilterSBI_InValid_Empty_column |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_ServiceToFilterSBI_InValid_Empty_column, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "", "type": "all" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - must not be blank :request.filters[0].columnName" } ] }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI filtering fails when the column parameter is empty, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToFilterSBI_InValid_Empty_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_ServiceToFilterSBI_InValid_Empty_type, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "providerId", "type": "" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322", "message": "Filter Type cannot be empty or null" } ] }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI filtering fails when the type parameter is empty, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToFilterSBI_InValid_type_doesnt_exist |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_ServiceToFilterSBI_InValid_type_doesnt_exist, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "providerId", "type": "asdfg" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324", "message": "Received Filter Type not supported" } ] }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI filtering fails when the specified type does not exist, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ServiceToFilterSBI_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_ServiceToFilterSBI_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "providerId", "type": "unique" }], "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that Secure Biometric Interfaces (SBI) are successfully filtered with valid inputs, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MapDeviceWithSBI_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_MapDeviceWithSBI_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/devicedetails/map, role=partner, templateFields=null, input={ "deviceDetailId": "$ID:ServiceToSaveDeviceDetail_All_Valid_Smoke_sid_id$", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBI, outputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBIResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a device is successfully mapped with a Secure Biometric Interface with all valid inputs, uniqueIdentifier=TC_PMS_MapDeviceWithSBI_01, additionalDependencies=TC_PMS_createServiceToSaveDeviceDetail_01 |
| Messages |
| Testcase Name |
|---|
| Pms_MapDeviceWithSBI_Multiple_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_MapDeviceWithSBI_Multiple_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/devicedetails/map, role=partner, templateFields=null, input={ "deviceDetailId": "$ID:ServiceToSaveDeviceDetail_All_Valid_Smoke_sid_id$", "sbiId": "$ID:SaveSecureBiometricInterface_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBI, outputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBIResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that multiple devices are successfully mapped with a Secure Biometric Interface with all valid inputs, uniqueIdentifier=TC_PMS_MapDeviceWithSBI_02, additionalDependencies=TC_PMS_createServiceToSaveDeviceDetail_01 |
| Messages |
| Testcase Name |
|---|
| Pms_MapDeviceWithSBI_Multiple_MapDeviceWith_Diff_Provider |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_MapDeviceWithSBI_Multiple_MapDeviceWith_Diff_Provider, endPoint=/v1/partnermanager/securebiometricinterface/devicedetails/map, role=partner, templateFields=null, input={ "deviceDetailId": "MOSIP.PROXY.SBI", "sbiId": "$ID:SaveSecureBiometricInterface_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_AUT_005" } ] }, inputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBI, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that multiple devices from different providers can be mapped to a Secure Biometric Interface, uniqueIdentifier=TC_PMS_MapDeviceWithSBI_04, additionalDependencies=TC_PMS_createSaveSecureBiometricInterface_02 |
| Messages |
| Testcase Name |
|---|
| Pms_MapDeviceWithSBI_Multiple_map |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_MapDeviceWithSBI_Multiple_map, endPoint=/v1/partnermanager/securebiometricinterface/devicedetails/map, role=partner, templateFields=null, input={ "deviceDetailId": "$ID:ServiceToSaveDeviceDetail_All_Valid_Smoke_sid_id$", "sbiId": "$ID:SaveSecureBiometricInterface_TO_Map_Smoke_sid_id$" }, output={ }, inputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBI, outputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBIResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that multiple devices can be mapped to a Secure Biometric Interface, uniqueIdentifier=TC_PMS_MapDeviceWithSBI_03, additionalDependencies=TC_PMS_createServiceToSaveDeviceDetail_01 |
| Messages |
| Testcase Name |
|---|
| Pms_RemoveMapDeviceWithSBI_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_RemoveMapDeviceWithSBI_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/devicedetails/map/remove, role=partner, templateFields=null, input={ "deviceDetailId": "$ID:ServiceToSaveDeviceDetail_All_Valid_Smoke_sid_id$", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ "response": "Success" }, inputTemplate=pms/device/SecureBiometricInterface/RemoveMapDeviceWithSBI/removeMapDeviceWithSBI, outputTemplate=pms/device/SecureBiometricInterface/RemoveMapDeviceWithSBI/removeMapDeviceWithSBIResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a device is successfully unmapped from a Secure Biometric Interface with all valid inputs, uniqueIdentifier=TC_PMS_RemoveMapDeviceWithSBI_01, additionalDependencies=TC_PMS_createServiceToSaveDeviceDetail_01 |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output= { }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a device is successfully mapped to an SBI when all inputs are valid, uniqueIdentifier=TC_PMS_ApproveMappingDevice_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_ForDeactivate_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_ForDeactivate_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForDeactivate_AllValid_Smoke_sid_id$" }, output= { }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a device can be mapped to an SBI successfully even when the SBI is deactivated, using valid inputs, uniqueIdentifier=TC_PMS_ApproveMappingDevice_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_different_deviceDetails_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_different_deviceDetails_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "34242" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device mapping to an SBI fails when the provided device details do not match the expected SBI mapping, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_which_is_already_approved_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_which_is_already_approved_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device mapping to an SBI fails when the device has already been approved for the same SBI, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_with_Invalid_DeviceID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_Invalid_DeviceID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$7372882$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device mapping to an SBI fails when an invalid device ID is provided, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_with_Invalid_Partner_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_Invalid_Partner_Authentication_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device mapping to an SBI fails when invalid partner authentication is provided, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_with_Invalid_SBIID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_Invalid_SBIID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "84838772", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device mapping to an SBI fails when an invalid or non-existent SBI ID is provided, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_with_missing_SBIID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_missing_SBIID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$REMOVE$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_024" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device mapping to an SBI fails when the SBI ID is missing, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_with_random_DeviceProviderID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_random_DeviceProviderID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "deivce-sunny", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device mapping to an SBI fails when a random or invalid device provider ID is provided, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_without_Partner_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_Partner_Authentication_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device mapping to an SBI fails when partner authentication is not provided, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_without_Req_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_Req_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device mapping to an SBI fails when the request ID is missing, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_without_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$REMOVE$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device mapping to an SBI fails when request time is missing, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_without_SBI_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device mapping to an SBI fails when the SBI ID is missing, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_without_Version_value_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_Version_value_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device mapping to an SBI fails when the version value is missing, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_without_deviceProviderID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_deviceProviderID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device mapping to an SBI fails when the device provider ID is missing, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output= { }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbi, outputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that mapping of a device to SBI can be rejected successfully with all valid inputs, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbi_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_whichisRejected_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_whichisRejected_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the mapping is already in a rejected state, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbi_32, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSb_ReqID_Null_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSb_ReqID_Null_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "null", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the request ID is null, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_Empty_Device_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": " " }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the device ID is empty, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_Empty_Partner_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_Partner_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the partner ID is empty, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_Empty_RequestTimeString_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_RequestTimeString_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": " ", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the request time string is empty, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_Empty_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the request time is empty, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_Empty_SBI_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the SBI ID is empty, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_Empty_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": " ", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that Reject mapping device to sbi while keeping Version parameter as Empty in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_Invalid_SBI_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "7281818", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when an invalid SBI ID is provided, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_Invalid_VersionValue0_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_VersionValue0_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that Reject mapping device to sbi while keeping Version parameter as invalid value 0 in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_Invalid_VersionValue1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_VersionValue1_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that Reject mapping device to sbi while keeping Version parameter as invalid value 1 in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_Invalid_VersionValues_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_VersionValues_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "7288283", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that Reject mapping device to sbi while keeping Version parameter as invalid values in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_Missing_Req_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_Missing_Req_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the required request ID is missing, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_Missing_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_Missing_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that Reject mapping device to sbi while keeping Version parameter as Missing in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_Null_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_Null_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "null", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that Reject mapping device to sbi while keeping Version parameter as Null in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_Provide_different_SBIID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_Provide_different_SBIID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:GetListOfAllSBI_partnerId_valid_sid_sbiId$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when a different SBI ID is provided, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_33, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_ReqID_Empty_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_ReqID_Empty_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the request ID is empty, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_ReqID_Invalid_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_ReqID_Invalid_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "7472828", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the request ID is invalid, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_already_Rejected_mapped_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_already_Rejected_mapped_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the mapping has already been rejected, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_different_format_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_different_format_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "1111-07-22T08:21:17.665Z", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the request time is provided in an incorrect format, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_invalid_Device_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "812293" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when an invalid device ID is provided, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_invalid_Device_IDvalues_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_Device_IDvalues_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "8228828" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when invalid device ID values are provided, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_30, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_invalid_Partner_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_Partner_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "100223111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when an invalid partner ID is provided, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_invalid_object_paramter_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_object_paramter_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "jadhav", "sbiId": "9329", "deviceDetailId": "93130" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when an invalid object parameter is provided, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_null_Device_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_null_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "null" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the device ID is null, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_null_Partner_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_null_Partner_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "null", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the partner ID is null, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_null_SBI_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_null_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "null", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the SBI ID is null, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_random_SBI_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_random_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "731811993", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when a random or invalid SBI ID is provided, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_with_Partner_Roles_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_with_Partner_Roles_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=device, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the partner role is not authorized to perform the action, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_31, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_with_different_Device_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_with_different_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "233313" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when a device ID that does not match the request is provided, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_without_Partner_Auth_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_without_Partner_Auth_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.reject.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when partner authentication is missing, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_without_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_without_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$REMOVE$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the request time is missing, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RejectMappingDeviceToSbi_without_SBI_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_RejectMappingDeviceToSbi_without_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting the mapping of a device to SBI fails when the SBI ID is missing, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_whichisRejected_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_whichisRejected_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device mapping to an SBI fails when the SBI has been rejected, uniqueIdentifier=TC_PMS_ApproveMappingDevice_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllDeviceListMappedWithSbi_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output= { "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "$RUNCONTEXT$pms-111998" }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbiResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all devices mapped with SBIs are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedwithSbi_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllDeviceListMappedWithSbi_Invalid_SBI_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_Invalid_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "sbiId": "AJDJD9281" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving devices mapped with SBIs fails when an invalid SBI ID is provided, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllDeviceListMappedWithSbi_when_SBI_not_authenticated_device_provider_SBI_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_when_SBI_not_authenticated_device_provider_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_With_FTMPartner_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_019" } ] }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving devices mapped with SBIs fails when the SBI ID is not associated with an authenticated device provider, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllDeviceListMappedWithSbi_without_authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_without_authentication_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=invalidtoken, templateFields=null, input={ "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving all devices mapped with SBIs fails when authentication is not provided, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBI_PendingForApproval_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBI_PendingForApproval_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterface_Valid_ForDeactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_022" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when the SBI is pending approval, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnersPolicy_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnersPolicy_allValid_smoke, endPoint=/v1/policymanager/policies/{policyId}/partner/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "mpartner-default-auth", "policyId": "mpolicy-default-auth", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupId": "mpolicygroup-default-auth", "policyGroupName": "mpolicygroup-default-auth", "policyId": "$IGNORE$", "policyName": "$IGNORE$", "status": "PUBLISHED" }, inputTemplate=pms/GetPartnersPolicy/getPartnersPolicy, outputTemplate=pms/GetPartnersPolicy/getPartnersPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all policies associated with partners are retrieved successfully for a valid request, uniqueIdentifier=TC_PMS_GetPartnersPolicy_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnersPolicy_invalid_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnersPolicy_invalid_partnerId, endPoint=/v1/policymanager/policies/{policyId}/partner/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "abcd", "policyId": "mpolicy-default-auth", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_017" } ] }, inputTemplate=pms/GetPartnersPolicy/getPartnersPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving partner policies fails when an invalid partner ID is provided, uniqueIdentifier=TC_PMS_GetPartnersPolicy_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllPolicyGroup_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllPolicyGroup_allValid_smoke, endPoint=/v1/policymanager/policies/group/all, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output={ } , inputTemplate=pms/GetAllPolicyGroup/getAllPolicyGroup, outputTemplate=pms/GetAllPolicyGroup/getAllPolicyGroupResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all policy groups are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetAllPolicyGroup_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicyGroup_AllValid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicyGroup_AllValid_Smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Policy Groups with all valid inputs returns the expected results successfully, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicyGroup_Only_FilterCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicyGroup_Only_FilterCriteria_Smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "Auth" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Policy Groups using only filter criteria returns the expected results correctly, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicyGroup_Only_PaginationCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicyGroup_Only_PaginationCriteria_Smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Policy Groups using only pagination criteria returns results correctly, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicyGroup_Only_SortCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicyGroup_Only_SortCriteria_Smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "name", "sortType": "asc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Policy Groups using only sort criteria returns results correctly, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicyGroup_columnname_id_asc_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicyGroup_columnname_id_asc_smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "id", "type": "contains", "value": "mpolicygroup-default-auth" } ], "sort": [ { "sortField": "id", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Policy Groups sorted by id in ascending order returns correct results, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicyGroup_columnname_id_desc_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicyGroup_columnname_id_desc_smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "id", "type": "contains", "value": "mpolicygroup-default-auth" } ], "sort": [ { "sortField": "id", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Policy Groups sorted by id in descending order returns correct results, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicyGroup_type_contains_Smoke_asc_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicyGroup_type_contains_Smoke_asc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "Auth" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Policy Groups with type containing a value sorted ascending by sid returns correct results, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicyGroup_type_contains_Smoke_desc_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicyGroup_type_contains_Smoke_desc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "Auth" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Policy Groups with type containing a value sorted descending by sid returns correct results, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicyGroup_type_equals_Smoke_asc_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicyGroup_type_equals_Smoke_asc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "equals", "value": "mpolicygroup-default-auth" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "isActive": true }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Policy Groups with type equal to a value sorted ascending by sid returns correct results, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicyGroup_type_equals_Smoke_desc_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicyGroup_type_equals_Smoke_desc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "equals", "value": "mpolicygroup-default-auth" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Policy Groups with type equal to a value sorted descending by sid returns correct results, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicyGroup_type_startswith_Smoke_asc_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicyGroup_type_startswith_Smoke_asc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "Auth" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Policy Groups with type starting with a value sorted ascending by sid returns correct results, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicyGroup_type_startswith_Smoke_desc_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicyGroup_type_startswith_Smoke_desc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "Auth" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Policy Groups with type starting with a value sorted descending by sid returns correct results, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPolicyGroup_with_missing_columnName |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPolicyGroup_with_missing_columnName, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "$REMOVE$", "type": "startswith", "value": "Data Share" } ], "sort": [ { "sortField": "descr", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-311" } ] }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Policy Groups with the columnName parameter missing returns results using default behavior, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PolicyGroupFilter_Invalid_Column_doesnt_exist |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PolicyGroupFilter_Invalid_Column_doesnt_exist, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "sfg", "type": "all", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_003" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner while keeping invalid values in Column parameter, uniqueIdentifier=TC_PMS_PolicyGroupFilter_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PolicyGroupFilter_Invalid_EmptyColumnName |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PolicyGroupFilter_Invalid_EmptyColumnName, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "all", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner while keeping ColumnName parameter as Empty, uniqueIdentifier=TC_PMS_PolicyGroupFilter_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PolicyGroupFilter_Invalid_EmptyFilterType |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PolicyGroupFilter_Invalid_EmptyFilterType, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_003", "message": "Could not process the request" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner while keeping FilterType parameter as Empty, uniqueIdentifier=TC_PMS_PolicyGroupFilter_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PolicyGroupFilter_Invalid_Type_doesnt_exist |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PolicyGroupFilter_Invalid_Type_doesnt_exist, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "sfgar", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_003", "message": "Could not process the request" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner while keeping invalid values in Type parameter, uniqueIdentifier=TC_PMS_PolicyGroupFilter_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PolicyGroupFilter_all_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PolicyGroupFilter_all_Valid_Smoke, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "all", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "name", "fieldValue": "mpolicygroup-default-auth", "fieldCode": "mpolicygroup-default-auth" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner with valid values, uniqueIdentifier=TC_PMS_PolicyGroupFilter_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PolicyGroupFilter_using_name_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PolicyGroupFilter_using_name_Valid_Smoke, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "unique", "text": "$RUNCONTEXT$update_policy_group" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "name", "fieldValue": "$RUNCONTEXT$update_policy_group", "fieldCode": "$RUNCONTEXT$update_policy_group" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy groups are successfully filtered using the name with valid inputs, uniqueIdentifier=TC_PMS_PolicyGroupFilter_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PolicyGroupFilter_using_name_with_columnname_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PolicyGroupFilter_using_name_with_columnname_Valid_Smoke, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "all", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "name", "fieldValue": "mpolicygroup-default-auth", "fieldCode": "mpolicygroup-default-auth" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner while keeping valid name for coulmnname parameter, uniqueIdentifier=TC_PMS_PolicyGroupFilter_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetValueForConfigKey_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetValueForConfigKey_allValid_smoke, endPoint=/v1/policymanager/policies/config/{key}, role=partner, templateFields=null, input={ "key": "abcd", "requesttime": "$TIMESTAMP$" }, output={ "key": "abcd", } , inputTemplate=pms/GetValueForConfigKey/getValueForConfigKey, outputTemplate=pms/GetValueForConfigKey/getValueForConfigKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all configuration key values are retrieved successfully for valid requests, uniqueIdentifier=TC_PMS_GetValueForConfigKey_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerFilter_Invalid_Column_doesnt_exist |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PartnerFilter_Invalid_Column_doesnt_exist, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "asfgs", "type": "unique", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner filtering fails when the specified filter column does not exist., uniqueIdentifier=TC_PMS_PartnerFilter_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerFilter_Invalid_EmptyFilterType |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PartnerFilter_Invalid_EmptyFilterType, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner filtering fails when the filterType is empty, uniqueIdentifier=TC_PMS_PartnerFilter_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerFilter_Invalid_Empty_column |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PartnerFilter_Invalid_Empty_column, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "unique", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner filtering fails when the filter column is empty, uniqueIdentifier=TC_PMS_PartnerFilter_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerFilter_Invalid_type_doesnt_exist |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PartnerFilter_Invalid_type_doesnt_exist, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "asdg", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner filtering fails when the specified filter type does not exist, uniqueIdentifier=TC_PMS_PartnerFilter_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerFilter_all_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PartnerFilter_all_Valid_Smoke, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "all", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "id", "fieldValue": "mpartner-default-abis", "fieldCode": "mpartner-default-abis" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partners are successfully filtered with all valid inputs, uniqueIdentifier=TC_PMS_PartnerFilter_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerFilter_unique_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PartnerFilter_unique_Valid_Smoke, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "unique", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "id", "fieldValue": "mpartner-default-abis", "fieldCode": "mpartner-default-abis" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partners are successfully filtered using unique criteria with all valid inputs, uniqueIdentifier=TC_PMS_PartnerFilter_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerApiKey_AllValid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerApiKey_AllValid_Smoke, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner API Keys with all valid inputs returns the expected results successfully, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerApiKey_Only_FilterCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerApiKey_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "policyApiKey", "type": "unique", "value": "mpolicy_part_auth_api" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner API Keys using only filter criteria returns the expected results correctly, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerApiKey_Only_Pagination_Criteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerApiKey_Only_Pagination_Criteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner API Keys using only pagination criteria returns results correctly, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerApiKey_Only_SortCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerApiKey_Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "isActive", "sortType": "asc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner API Keys using only sort criteria returns results correctly, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerApiKey_type_contains_Smoke_asc_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerApiKey_type_contains_Smoke_asc_sid, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "policyApiKey", "type": "unique", "value": "mpolicy_part_auth_api" } ], "sort": [ { "sortField": "isActive", "sortType": "asc" } ], "pageFetch": "1", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner API Keys with type containing a value, sorted ascending by sid returns correct results, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerApiKey_type_contains_invalid_columnName |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerApiKey_type_contains_invalid_columnName, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "abcd", "type": "contains", "value": "mpolicy_part_auth_api" } ], "sort": [ { "sortField": "policyApiKey", "sortType": "asc" } ], "pageFetch": "0", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-310" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner API Keys with type containing a value and an invalid column name returns an appropriate error, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerApiKey_type_contains_invalid_pagination |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerApiKey_type_contains_invalid_pagination, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "policyApiKey", "type": "contains", "value": "mpolicy_part_auth_api" } ], "sort": [ { "sortField": "policyApiKey", "sortType": "asc" } ], "pageFetch": "0", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-313" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner API Keys with type containing a value and invalid pagination parameters returns an appropriate error, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerApiKey_type_contains_invalid_sortField |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerApiKey_type_contains_invalid_sortField, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "policyApiKey", "type": "contains", "value": "mpolicy_part_auth_api" } ], "sort": [ { "sortField": "abcd", "sortType": "asc" } ], "pageFetch": "0", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-357" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner API Keys with type containing a value and an invalid sortField returns an appropriate error, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerApiKey_type_contains_invalid_sortType |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerApiKey_type_contains_invalid_sortType, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "policyApiKey", "type": "contains", "value": "mpolicy_part_auth_api" } ], "sort": [ { "sortField": "policyApiKey", "sortType": "abcd" } ], "pageFetch": "0", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner API Keys with type containing a value and an invalid sortType returns an appropriate error, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerApiRequestKey_AllValid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerApiRequestKey_AllValid_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner API Request Keys with all valid inputs returns the expected results successfully, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerApiRequestKey_Only_FilterCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerApiRequestKey_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "id", "type": "unique", "value": "mpartner_policy_auth_req" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner API Request Keys using only filter criteria returns the expected results correctly, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerApiRequestKey_Only_PaginationCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerApiRequestKey_Only_PaginationCriteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner API Request Keys using only pagination criteria returns results correctly, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerApiRequestKey_Only_SortCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerApiRequestKey_Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "id", "sortType": "desc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner API Request Keys using only sort criteria returns results correctly, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerApiRequestKey_type_contains_Smoke_asc_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerApiRequestKey_type_contains_Smoke_asc_sid, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "id", "type": "unique", "value": "mpartner_policy_auth_req" } ], "sort": "$IGNORE$", "pageFetch": "1", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner API Request Keys with type containing a value sorted ascending by sid returns correct results, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerApiRequestKey_type_contains_invalid_pagination |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerApiRequestKey_type_contains_invalid_pagination, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "id", "type": "unique", "value": "mpartner_policy_auth_req" } ], "sort": "$IGNORE$", "pageFetch": "0", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-313" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner API Request Keys with type containing a value and invalid pagination parameters returns an appropriate error, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerApiKeyRequestFilter_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PartnerApiKeyRequestFilter_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "all", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "id", "fieldValue": "mpartner_policy_auth_req", "fieldCode": "mpartner_policy_auth_req" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner API key requests are successfully filtered with all valid inputs, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerApiKeyRequestFilter_Invalid_Column_doesnt_exist |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PartnerApiKeyRequestFilter_Invalid_Column_doesnt_exist, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "asdf", "type": "unique", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner API key request filtering fails when the specified filter column does not exist, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerApiKeyRequestFilter_Invalid_EmptyFilterColumn |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PartnerApiKeyRequestFilter_Invalid_EmptyFilterColumn, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "unique", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner API key request filtering fails when the filterColumn is empty, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerApiKeyRequestFilter_Invalid_EmptyFilterType |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PartnerApiKeyRequestFilter_Invalid_EmptyFilterType, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner API key request filtering fails when the filterType is empty, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerApiKeyRequestFilter_Invalid_type_doesnt_exist |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PartnerApiKeyRequestFilter_Invalid_type_doesnt_exist, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "sfga", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner API key request filtering fails when the specified filter type does not exist, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_PartnerApiKeyRequestFilter_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_PartnerApiKeyRequestFilter_Valid_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "unique", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "id", "fieldValue": "mpartner_policy_auth_req", "fieldCode": "mpartner_policy_auth_req" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner API key requests are successfully filtered using valid inputs, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_AllValid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_AllValid_Smoke, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types with all valid inputs returns the expected results successfully, uniqueIdentifier=TC_PMS_createSearchPartnerType_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_Only_FilterCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "contains", "value": "Device_Provider" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types using only filter criteria returns the expected results correctly, uniqueIdentifier=TC_PMS_createSearchPartnerType_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_Only_PaginationCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_Only_PaginationCriteria_Smoke, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types using only pagination criteria returns results correctly, uniqueIdentifier=TC_PMS_createSearchPartnerType_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_Only_SortCriteria_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "code", "sortType": "asc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types using only sort criteria returns results correctly, uniqueIdentifier=TC_PMS_createSearchPartnerType_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_type_contains_Smoke_asc |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_type_contains_Smoke_asc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "contains", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types with type containing a value sorted in ascending order returns correct results, uniqueIdentifier=TC_PMS_createSearchPartnerType_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_type_contains_Smoke_desc |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_type_contains_Smoke_desc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "contains", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types with type containing a value sorted in descending order returns correct results, uniqueIdentifier=TC_PMS_createSearchPartnerType_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_type_equals_Smoke_asc |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_type_equals_Smoke_asc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types with type equal to a value sorted in ascending order returns correct results, uniqueIdentifier=TC_PMS_createSearchPartnerType_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_type_equals_Smoke_desc |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_type_equals_Smoke_desc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types with type equal to a value sorted in descending order returns correct results, uniqueIdentifier=TC_PMS_createSearchPartnerType_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_type_startswith_Smoke_asc |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_type_startswith_Smoke_asc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types with type starting with a value sorted in ascending order returns correct results, uniqueIdentifier=TC_PMS_createSearchPartnerType_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_type_startswith_Smoke_desc |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_type_startswith_Smoke_desc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types with type starting with a value sorted in descending order returns correct results, uniqueIdentifier=TC_PMS_createSearchPartnerType_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_with_invalid_columnName |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_with_invalid_columnName, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "co@@@@@343455666###4$$%%de", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-310" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types with an invalid column name returns an appropriate error, uniqueIdentifier=TC_PMS_createSearchPartnerType_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_with_invalid_sort_field |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_with_invalid_sort_field, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "mo@@@del" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types fails and returns an appropriate error when an invalid sortField is provided in the request, uniqueIdentifier=TC_PMS_createSearchPartnerType_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_with_invalid_sort_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_with_invalid_sort_type, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "dc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types with an invalid sortType returns an appropriate error, uniqueIdentifier=TC_PMS_createSearchPartnerType_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_with_invalid_value_equals |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_with_invalid_value_equals, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "a@@@334455667788s" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types with an invalid value using type equals returns no results, uniqueIdentifier=TC_PMS_createSearchPartnerType_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_with_invalid_value_startswith |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_with_invalid_value_startswith, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "a@@@334455667788s" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types with an invalid value using type starts with returns no results, uniqueIdentifier=TC_PMS_createSearchPartnerType_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_with_missing_columnName |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_with_missing_columnName, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "$REMOVE$", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-311" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types with the columnName parameter missing returns results using default behavior, uniqueIdentifier=TC_PMS_createSearchPartnerType_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_with_missing_sort_field |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_with_missing_sort_field, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "$REMOVE$", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types with the sortField parameter missing returns results using default sorting, uniqueIdentifier=TC_PMS_createSearchPartnerType_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_with_missing_sort_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_with_missing_sort_type, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "$REMOVE$" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types with the sortType parameter missing returns results using default sorting, uniqueIdentifier=TC_PMS_createSearchPartnerType_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchPartnerType_with_missing_type |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchPartnerType_with_missing_type, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "$REMOVE$", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-312" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that searching Partner Types with the type parameter missing returns results using default behavior, uniqueIdentifier=TC_PMS_createSearchPartnerType_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_All_Approved_Ftm_Provider_AllValid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_All_Approved_Ftm_Provider_AllValid_Smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=FTM_Provider, role=partnerftm, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProvider, outputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProviderResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all approved FTM providers are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProvider_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_Get_All_Approved_Ftm_Provider_Before_Uploading_CA_Cert_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Before_Uploading_CA_Cert_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProviderBeforeUploadingCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving all approved FTM providers fails when the CA certificate has not been uploaded, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_Get_All_Approved_Ftm_Provider_Before_Uploading_Partner_Cert_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Before_Uploading_Partner_Cert_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProviderBeforeUploadingCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving all approved FTM providers fails when the partner certificate has not been uploaded, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_Get_All_Approved_Ftm_Provider_Invalid_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Invalid_Token_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProvider, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving all approved FTM providers fails when an invalid authentication token is provided, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_Get_All_Approved_Ftm_Provider_Without_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Without_Authentication_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProvider, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving all approved FTM providers fails when authentication is not provided, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListAllFTMChip_Invalid_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListAllFTMChip_Invalid_Token_Neg, endPoint=/v1/partnermanager/ftpchipdetail, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chip list retrieval fails when an invalid token is used, uniqueIdentifier=TC_PMS_GetListAllFTMChipNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListAllFTMChip_WhenNo_FTM_Chips_AddedNeg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListAllFTMChip_WhenNo_FTM_Chips_AddedNeg, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerftm, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/GetListAllFTMChip/GetListAllFTMChipResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the FTM chip list is empty when no FTM chips are added, uniqueIdentifier=TC_PMS_GetListAllFTMChipNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListAllFTMChip_With_Auth_Partner_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListAllFTMChip_With_Auth_Partner_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chip list retrieval fails when accessed using an authenticated partner token that is not authorized, uniqueIdentifier=TC_PMS_GetListAllFTMChipNegativeScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListAllFTMChip_With_Device_Partner_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListAllFTMChip_With_Device_Partner_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerdevice, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chip list retrieval fails when accessed using a device partner authentication token, uniqueIdentifier=TC_PMS_GetListAllFTMChipNegativeScenarios_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListAllFTMChip_Without_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListAllFTMChip_Without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chip list retrieval fails when no authentication is provided, uniqueIdentifier=TC_PMS_GetListAllFTMChipNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Partner_CreateFTPChipDetail_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Partner_CreateFTPChipDetail_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerftm, templateFields=null, input={ "ftpProviderId": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$", "make": "Make123", "model": "MODEL-01", "requesttime": "$TIMESTAMP$" }, output={ "id": "$IGNORE$" }, inputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetails, outputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTP chip details are successfully created when all required inputs are valid, uniqueIdentifier=TC_PMS_CreateFTPChipDetail_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateFTPChipDetail_Missing_InputParameter_ftpId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateFTPChipDetail_Missing_InputParameter_ftpId, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "ftpProviderId": "$REMOVE$", "make": "Make123", "model": "MODEL-01", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTP chip detail creation fails when the FTP ID input parameter is missing, uniqueIdentifier=TC_PMS_CreateFTPChipDetail_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateFTPChipDetail_Missing_InputParameter_ftpProviderId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateFTPChipDetail_Missing_InputParameter_ftpProviderId, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "ftpProviderId": "FTP-AUTOMATION", "make": "$REMOVE$", "model": "MODEL-01", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTP chip detail creation fails when the FTP provider ID input parameter is missing, uniqueIdentifier=TC_PMS_CreateFTPChipDetail_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerftm, templateFields=null, input={ "ftpProviderId": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$", "make": "AcmeCorpFtm", "model": "mode2" }, output={ }, inputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetails, outputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chip details are successfully created for an FTM provider when all inputs are valid, uniqueIdentifier=TC_PMS_createFtmChipDetails_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateFtpChipDetail_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_UpdateFtpChipDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "ftpChipDetailId": "$ID:CreateFTPChipDetail_All_Valid_Smoke_sid_id$", "make": "Make123Updated", "model": "MODEL-001", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/UpdateFtpChipDetail/updateFtpChipDetail, outputTemplate=pms/device/ftmChipDetails/update/updateFtpChipDetailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating FTM Chip details with all valid inputs is successful and the changes are reflected correctly, uniqueIdentifier=TC_PMS_UpdateFtpChipDetail_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateFtpChipDetail_Missing_InputParameter_ftpChipDetailId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePut |
| Testcase Input |
| testCaseName=Pms_UpdateFtpChipDetail_Missing_InputParameter_ftpChipDetailId, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "ftpChipDetailId": "$REMOVE$", "make": "Make123", "model": "MODEL-001", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UpdateFtpChipDetail/updateFtpChipDetail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating FTM Chip details fails when the ftpChipDetailId parameter is missing, uniqueIdentifier=TC_PMS_UpdateFtpChipDetail_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_Before_Uploading_Partner_Cert_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_Before_Uploading_Partner_Cert_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_011" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails when partner certificates are not yet uploaded., uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacte_BeforecertUpload_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_whichisPendingforCertUpload_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_whichisPendingforCertUpload_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_010" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM device deactivation fails when the device is pending certificate upload, uniqueIdentifier=TC_PMS_DeactivateFtm_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_forPendingforCertUpload_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_forPendingforCertUpload_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_011" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails or returns appropriate errors when attempting to retrieve partner certificates that are still pending certificate upload, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCertificate_AllValid_smoke_ftpProviderId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCertificate_AllValid_smoke_ftpProviderId, endPoint=/v1/partnermanager/ftpchipdetail/uploadcertificate, role=partnerftm, templateFields=null, input={ "requesttime":"$TIMESTAMP$", "certificateData": "$PARTNERCERT$", "ftpProviderId": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$", "ftpChipDeatilId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$", "isItForRegistrationDevice": true, "organizationName": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$", "partnerId": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "FTM" }, output= { }, inputTemplate=pms/UploadCertificateOfFtpChip/UploadCertificateOfFtpChip, outputTemplate=pms/UploadCertificateOfFtpChip/UploadCertificateOfFtpChipResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a Certificate with all valid inputs for a given FTM/FTP Provider ID is successful, uniqueIdentifier=TC_PMS_UploadCertificateOfFtpChip_01, additionalDependencies=TC_PMS_UploadCaCertificateOfFtpChip_01, TC_PMS_UploadCaCertificateOfFtpChip_02 |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCertificate_InValid_ftpChipId_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCertificate_InValid_ftpChipId_neg, endPoint=/v1/partnermanager/ftpchipdetail/uploadcertificate, role=partner, templateFields=null, input={ "ftpProviderId": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$", "certificateData": "$PARTNERCERT$", "ftpChipDeatilId": "asdf", "isItForRegistrationDevice": true, "organizationName": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$", "partnerId": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "FTM" }, output= { "errors": [ { "errorCode": "PMP_AUT_031" } ] }, inputTemplate=pms/UploadCertificateOfFtpChip/UploadCertificateOfFtpChip, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a Certificate fails when an invalid FTM Chip ID is provided, uniqueIdentifier=TC_PMS_UploadCertificateOfFtpChip_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UploadCertificate_InValid_ftpProviderId_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_UploadCertificate_InValid_ftpProviderId_neg, endPoint=/v1/partnermanager/ftpchipdetail/uploadcertificate, role=partner, templateFields=null, input={ "ftpProviderId": "asdgfb", "certificateData": "$PARTNERCERT$", "ftpChipDeatilId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$", "isItForRegistrationDevice": true, "organizationName": "ftp", "partnerId": "$ID:PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke_sid_partnerId$", "partnerDomain": "FTM" }, output= { "errors": [ { "errorCode": "PMP_AUT_030" } ] }, inputTemplate=pms/UploadCertificateOfFtpChip/UploadCertificateOfFtpChip, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that uploading a Certificate fails when an invalid FTM/FTP Provider ID is provided, uniqueIdentifier=TC_PMS_UploadCertificateOfFtpChip_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_whichisPendingforApproval_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_whichisPendingforApproval_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_010" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM device deactivation fails when the device is still pending approval, uniqueIdentifier=TC_PMS_DeactivateFtm_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveFTMChipDetail_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_ApproveFTMChipDetail_allValid_smoke, endPoint=/v1/partnermanager/ftpchipdetail, role=partneradmin, templateFields=null, input={ "ftpChipDetailId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$", "approvalStatus": true }, output={ }, inputTemplate=pms/ApproveFTMChipDetail/ApproveFTMChipDetail, outputTemplate=pms/ApproveFTMChipDetail/ApproveFTMChipDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a FTM chip detail is successfully approved when all inputs are valid, uniqueIdentifier=TC_PMS_ApproveFTMchipDetail_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveFtpChipDetail_Missing_InputParameter_ftpChipDetailId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_ApproveFtpChipDetail_Missing_InputParameter_ftpChipDetailId, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "approvalStatus": true, "ftpChipDetailId": "$REMOVE$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/ApproveFTMChipDetail/ApproveFTMChipDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTP chip detail approval fails when the ftpChipDetailId input parameter is missing, uniqueIdentifier=TC_PMS_ApproveFtpChipDetail_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_rejectFtpChipDetail_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_rejectFtpChipDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "approvalStatus": false, "ftpChipDetailId": "$ID:CreateFTPChipDetail_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/RejectFtpChipDetail/rejectFtpChipDetail, outputTemplate=pms/RejectFtpChipDetail/rejectFtpChipDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chip details can be rejected successfully with all valid inputs, uniqueIdentifier=TC_PMS_rejectFtpChipDetail_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_rejectFtpChipDetail_Missing_InputParameter_ftpChipDetailId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePatch |
| Testcase Input |
| testCaseName=Pms_rejectFtpChipDetail_Missing_InputParameter_ftpChipDetailId, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "approvalStatus": true, "ftpChipDetailId": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/RejectFtpChipDetail/rejectFtpChipDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that rejecting FTM chip details fails when the ftpChipDetailId is missing, uniqueIdentifier=TC_PMS_rejectFtpChipDetail_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetFtpChipDetail_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetFtpChipDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail/getPartnerCertificate/{ftpChipDetailId}, role=partner, templateFields=null, input={ "ftpChipDetailId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/GetFtpChipDetail/getFtpChipDetail, outputTemplate=pms/GetFtpChipDetail/getFtpChipDetailResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all FTM chip details are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetFTPChipDetail_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListAllFTMChip_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListAllFTMChip_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerftm, templateFields=null, input={ }, output= { "partnerId": "pms-111888", "make": "AcmeCorpFtm", "model": "mode2 }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/GetListAllFTMChip/GetListAllFTMChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the list of all FTM chips is successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetListAllFTMChip_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_allValid_smoke, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalPartnerCertificatesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API successfully retrieves all original partner certificates when valid inputs are provided, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacte_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_Invalid_FTM_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_Invalid_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "0191230330" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_005" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails to retrieve partner certificates when an invalid FTM ID is provided, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_Invalid_Value_FTM_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_Invalid_Value_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "fsadf" }, output={ "errors": [ { "errorCode": "PMS_PRT_099" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails to retrieve partner certificates when a invalid value is provided for the FTM ID, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_SpaceVla_FTM_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_SpaceVla_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": " " }, output={ "errors": [ { "errorCode": "PMS_PRT_099" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails to retrieve partner certificates when the FTM ID contains spaces, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_with_Invalid_AccessToken_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_with_Invalid_AccessToken_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=invalidtoken, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails to retrieve partner certificates when an invalid or expired access token is used, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalPartnerCertificates_without_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalPartnerCertificates_without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=invalidtoken, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails to retrieve partner certificates when no authentication is provided, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all FTM chips are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_FTM_chip_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_with_make_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_with_make_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?make={make}, role=partneradmin, templateFields=null, input={ "make": "abcd", "pageSize": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chips are successfully retrieved when filtered by a valid make, uniqueIdentifier=TC_PMS_FTM_chip_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_with_model_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_with_model_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?model={model}, role=partneradmin, templateFields=null, input={ "model": "xyz", "make": "$REMOVE$", "pageSize": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chips are successfully retrieved when filtered by a valid model, uniqueIdentifier=TC_PMS_FTM_chip_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_with_orgName_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_with_orgName_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?orgName={orgName}, role=partneradmin, templateFields=null, input={ "orgName": "1", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chips are successfully retrieved when filtered by a valid orgName, uniqueIdentifier=TC_PMS_FTM_chip_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_with_pagesize_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_with_pagesize_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "pageSize": "5", "status": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chips are successfully retrieved when a valid page size is specified, uniqueIdentifier=TC_PMS_FTM_chip_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_with_partnerId_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_with_partnerId_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?partnerId={partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "a", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chips are successfully retrieved when filtered by a valid partnerId, uniqueIdentifier=TC_PMS_FTM_chip_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_with_random_value_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_with_random_value_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?partnerId={partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "16263gdvddgdv", "model": "$REMOVE$", "make": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chip retrieval fails when filtered with random values, uniqueIdentifier=TC_PMS_FTM_chip_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_with_sortType_ASC |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_with_sortType_ASC, endPoint=/v1/partnermanager/ftpchipdetail/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortType": "ASC", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chips are successfully retrieved in ascending order when sorted by a valid sortType, uniqueIdentifier=TC_PMS_FTM_chip_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_with_sortType_DESC |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_with_sortType_DESC, endPoint=/v1/partnermanager/ftpchipdetail/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortType": "DESC", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chips are successfully retrieved in descending order when sorted by a valid sortType, uniqueIdentifier=TC_PMS_FTM_chip_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_with_status_given_approved |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_with_status_given_approved, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "approved", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chips with status Approved are successfully retrieved, uniqueIdentifier=TC_PMS_FTM_chip_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_with_status_given_deactivated |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_with_status_given_deactivated, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "deactivated", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chips with status Deactivated are successfully retrieved, uniqueIdentifier=TC_PMS_FTM_chip_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_with_status_given_pending_approval |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_with_status_given_pending_approval, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_approval", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chips with status Pending Approval are successfully retrieved, uniqueIdentifier=TC_PMS_FTM_chip_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_with_status_given_pending_cert_upload |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_with_status_given_pending_cert_upload, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_cert_upload", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chips with status Pending Certificate Upload are successfully retrieved, uniqueIdentifier=TC_PMS_FTM_chip_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_with_status_given_rejected |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_with_status_given_rejected, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "rejected", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chips with status Rejected are successfully retrieved, uniqueIdentifier=TC_PMS_FTM_chip_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_with_with_combination_search_twofields |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_with_with_combination_search_twofields, endPoint=/v1/partnermanager/ftpchipdetail/v2?make={make}&model={model}, role=partneradmin, templateFields=null, input={ "make": "1", "model": "2", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chips are successfully retrieved when filtered using a combination of two fields, uniqueIdentifier=TC_PMS_FTM_chip_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_Negative_pageNo_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_Negative_pageNo_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "pageNo": "-6", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chip list retrieval fails when a negative page number is provided, uniqueIdentifier=TC_PMS_FTM_chip_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_Negative_pagesize_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_Negative_pagesize_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "pageSize": "-6", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chip list retrieval fails when a negative page size is provided, uniqueIdentifier=TC_PMS_FTM_chip_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_invalid_sortType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_invalid_sortType_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "sortType": "$%$^&&", "sortFieldName": "$REMOVE$", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chip list retrieval fails when an invalid sort type is provided, uniqueIdentifier=TC_PMS_FTM_chip_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_invalid_sortfield_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_invalid_sortfield_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "sortFieldName": "$%$^&&", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chip list retrieval fails when an invalid sort field is provided, uniqueIdentifier=TC_PMS_FTM_chip_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_invalid_token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_invalid_token_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chip list retrieval fails when an invalid token is used, uniqueIdentifier=TC_PMS_FTM_chip_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfFtmChip_without_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfFtmChip_without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM chip list retrieval fails when no authentication is provided, uniqueIdentifier=TC_PMS_FTM_chip_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_Invalid_orgName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_Invalid_orgName_Neg, endPoint=/v1/partnermanager/securebiometricinterface?orgName={orgName}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "*PMS", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI list retrieval fails when an invalid orgName is provided, uniqueIdentifier=TC_PMS_SBI_List_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_Invalid_sbiID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_Invalid_sbiID_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sbiId={sbiId}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "*12*", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI list retrieval fails when an invalid SBI ID is provided, uniqueIdentifier=TC_PMS_SBI_List_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_Invalid_sbiVersion_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_Invalid_sbiVersion_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sbiVersion={sbiVersion}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "*PMS", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI list retrieval fails when an invalid SBI version is provided, uniqueIdentifier=TC_PMS_SBI_List_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_Only_sortFieldName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_Only_sortFieldName_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "partnerId", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI list retrieval fails when only the sort field name is provided without sort type, uniqueIdentifier=TC_PMS_SBI_List_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_Only_sortType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_Only_sortType_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortType={sortType}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "asc", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI list retrieval fails when only the sort type is provided without a sort field name, uniqueIdentifier=TC_PMS_SBI_List_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_SBI_Version_Special_Character_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_SBI_Version_Special_Character_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sbiVersion={sbiVersion}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "@#", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { "totalResults": "0" }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBITotalResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI list retrieval fails when the SBI version contains special characters, uniqueIdentifier=TC_PMS_SBI_List_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_invalid_partnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_invalid_partnerId_Neg, endPoint=/v1/partnermanager/securebiometricinterface?partnerId={partnerId}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "*11", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI list retrieval fails when an invalid partnerId is provided, uniqueIdentifier=TC_PMS_SBI_List_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_invalid_sortFieldName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_invalid_sortFieldName_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}&sortType={sortType}&pageNo={pageNo}&pageSize={pageSize}, role=partnerdevice, templateFields=null, input={ "pageNo": "0", "pageSize": "4", "sortType": "asc", "sortFieldName": "partner", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI list retrieval fails when an invalid sort field name is provided, uniqueIdentifier=TC_PMS_SBI_List_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_invalid_sortType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_invalid_sortType_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortType={sortType}, role=partnerdevice, templateFields=null, input={ "sortType": "$%$^&&", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI list retrieval fails when an invalid sort type is provided, uniqueIdentifier=TC_PMS_SBI_List_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_invalid_sortfield_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_invalid_sortfield_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}, role=partnerdevice, templateFields=null, input={ "sortFieldName": "$%$^&&", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI list retrieval fails when an invalid sort field is provided, uniqueIdentifier=TC_PMS_SBI_List_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_invalid_token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_invalid_token_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving the list of all SBIs fails with an invalid or expired token, uniqueIdentifier=TC_PMS_SBI_List_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_negative_pageNo_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_negative_pageNo_Neg, endPoint=/v1/partnermanager/securebiometricinterface?pageNo={pageNo}, role=partnerdevice, templateFields=null, input={ "pageNo": "-7", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI list retrieval fails when a negative page number is provided, uniqueIdentifier=TC_PMS_SBI_List_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_negative_pageSize_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_negative_pageSize_Neg, endPoint=/v1/partnermanager/securebiometricinterface?pageSize={pageSize}, role=partnerdevice, templateFields=null, input={ "pageSize": "-7", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "pageNo": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI list retrieval fails when a negative page size is provided, uniqueIdentifier=TC_PMS_SBI_List_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllSBI_without_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllSBI_without_Authentication_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving the list of all SBIs fails without authentication, uniqueIdentifier=TC_PMS_SBI_List_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the list of all devices is successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_devicedetails_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_deviceId_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_deviceId_given, endPoint=/v1/partnermanager/devicedetail?deviceId={deviceId}, role=partneradmin, templateFields=null, input={ "deviceId": "9", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a device is successfully retrieved when filtered by a valid device ID, uniqueIdentifier=TC_PMS_devicedetails_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_deviceId_random_value_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_deviceId_random_value_given, endPoint=/v1/partnermanager/devicedetail?deviceId={deviceId}, role=partneradmin, templateFields=null, input={ "deviceId": "d", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device retrieval fails when a random or invalid device ID is provided, uniqueIdentifier=TC_PMS_devicedetails_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_deviceSubType_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_deviceSubType_given, endPoint=/v1/partnermanager/devicedetail?deviceSubType={deviceSubType}, role=partneradmin, templateFields=null, input={ "deviceSubType": "f", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that devices are successfully retrieved when filtered by a valid deviceSubType, uniqueIdentifier=TC_PMS_devicedetails_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_deviceType_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_deviceType_given, endPoint=/v1/partnermanager/devicedetail?deviceType={deviceType}, role=partneradmin, templateFields=null, input={ "deviceType": "i", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that devices are successfully retrieved when filtered by a valid deviceType, uniqueIdentifier=TC_PMS_devicedetails_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_invalid_sortfield_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_invalid_sortfield_Neg, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$$$$$$", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortType": "DESC", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device list retrieval fails when an invalid sortField is provided, uniqueIdentifier=TC_PMS_devicedetails_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_invalid_sorttype |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_invalid_sorttype, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}, role=partneradmin, templateFields=null, input={ "sortType": "device", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "make", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_358" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device list retrieval fails when an invalid sortType is provided, uniqueIdentifier=TC_PMS_devicedetails_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_invalid_token |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_invalid_token, endPoint=/v1/partnermanager/devicedetail, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving the list of all devices fails with an invalid token, uniqueIdentifier=TC_PMS_devicedetails_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_make_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_make_given, endPoint=/v1/partnermanager/devicedetail?make={make}, role=partneradmin, templateFields=null, input={ "make": "3", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that devices are successfully retrieved when filtered by a valid make, uniqueIdentifier=TC_PMS_devicedetails_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_model_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_model_given, endPoint=/v1/partnermanager/devicedetail?model={model}, role=partneradmin, templateFields=null, input={ "model": "4", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that devices are successfully retrieved when filtered by a valid model, uniqueIdentifier=TC_PMS_devicedetails_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_multiple_attribute_values_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_multiple_attribute_values_given, endPoint=/v1/partnermanager/devicedetail?make={make}&model={model}, role=partneradmin, templateFields=null, input={ "make": "1", "model": "1", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that devices are successfully retrieved when filtered using multiple attribute values, uniqueIdentifier=TC_PMS_devicedetails_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_negative_pageno |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_negative_pageno, endPoint=/v1/partnermanager/devicedetail?pageNo={pageNo}, role=partneradmin, templateFields=null, input={ "pageNo": "-5", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device list retrieval fails when a negative page number is provided, uniqueIdentifier=TC_PMS_devicedetails_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_negative_pagesize |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_negative_pagesize, endPoint=/v1/partnermanager/devicedetail?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "pageSize": "-5", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device list retrieval fails when a negative page size is provided, uniqueIdentifier=TC_PMS_devicedetails_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_sbiId_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_sbiId_given, endPoint=/v1/partnermanager/devicedetail?sbiId={sbiId}, role=partneradmin, templateFields=null, input={ "sbiId": "q", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that devices are successfully retrieved when filtered by a valid SBI ID, uniqueIdentifier=TC_PMS_devicedetails_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_sbiversion_given |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_sbiversion_given, endPoint=/v1/partnermanager/devicedetail?sbiVersion={sbiVersion}, role=partneradmin, templateFields=null, input={ "sbiVersion": "abcd", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that devices are successfully retrieved when filtered by a valid SBI version, uniqueIdentifier=TC_PMS_devicedetails_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_sorttype_asc |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_sorttype_asc, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortType": "asc", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that devices are successfully retrieved in ascending order when sorted by a valid sortType, uniqueIdentifier=TC_PMS_devicedetails_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_sorttype_desc |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_sorttype_desc, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}, role=partneradmin, templateFields=null, input={ "sortType": "desc", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "status", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that devices are successfully retrieved in descending order when sorted by a valid sortType, uniqueIdentifier=TC_PMS_devicedetails_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_with_orgName |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_with_orgName, endPoint=/v1/partnermanager/devicedetail?orgName={orgName}, role=partneradmin, templateFields=null, input={ "orgName": "1", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that devices are successfully retrieved when filtered by a valid orgName, uniqueIdentifier=TC_PMS_devicedetails_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_with_pagesize_specified |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_with_pagesize_specified, endPoint=/v1/partnermanager/devicedetail?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "pageSize": "7", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the list of all devices is retrieved successfully when a page size is specified, uniqueIdentifier=TC_PMS_devicedetails_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_with_partnerid |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_with_partnerid, endPoint=/v1/partnermanager/devicedetail?partnerId={partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "a", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that devices are successfully retrieved when filtered by a valid partnerId, uniqueIdentifier=TC_PMS_devicedetails_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_with_status_approved |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_with_status_approved, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "approved", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that devices with status Approved are successfully retrieved, uniqueIdentifier=TC_PMS_devicedetails_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_with_status_deactivated |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_with_status_deactivated, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "deactivated", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that devices with status Deactivated are successfully retrieved, uniqueIdentifier=TC_PMS_devicedetails_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_with_status_pending_approval |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_with_status_pending_approval, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_approval", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that devices with status Pending Approval are successfully retrieved, uniqueIdentifier=TC_PMS_devicedetails_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_with_status_rejected |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_with_status_rejected, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "rejected", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that devices with status Rejected are successfully retrieved, uniqueIdentifier=TC_PMS_devicedetails_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfAllDevice_without_Authentication |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfAllDevice_without_Authentication, endPoint=/v1/partnermanager/devicedetail, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving the list of all devices fails without authentication, uniqueIdentifier=TC_PMS_devicedetails_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetCountOfFtm_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetCountOfFtm_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetCountOfFtm/getCountOfFtm, outputTemplate=pms/GetCountOfFtm/getCountOfFtmResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the total count of FTM records is successfully retrieved with valid inputs, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllSystemConfigs_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllSystemConfigs_All_Valid_Smoke, endPoint=/v1/partnermanager/system-config, role=patneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllSystemConfigs/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllSystemConfigs/getAllApiKeyForAuthPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all system configurations are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetAllSystemConfigs_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllSystemConfigs_without_authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllSystemConfigs_without_authentication_Neg, endPoint=/v1/partnermanager/system-config, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllSystemConfigs/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that system configuration retrieval fails when no authentication is provided, uniqueIdentifier=TC_PMS_GetAllSystemConfigs_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllRootCertificate_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllRootCertificate_allValid_smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ }, output={ "caCertificateType": "ROOT" }, inputTemplate=pms/GetAllRootCertificate/getAllRootCertificate, outputTemplate=pms/GetAllRootCertificate/getAllRootCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all root certificates are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_getAllRootCertificate_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-api-keys, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the list of all API keys is successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetListOfApiKey_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_with_individual_partner_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_with_individual_partner_Neg, endPoint=/v1/partnermanager/partner-api-keys?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "pageSize": "$REMOVE$", "partnerId": "pms-111998", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfAllDeviceResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key list retrieval fails when accessed using an individual partner token, uniqueIdentifier=TC_PMS_GetListOfApiKey_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_with_invalid_pageSize |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_with_invalid_pageSize, endPoint=/v1/partnermanager/partner-api-keys?pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "pageSize": "-5", "partnerId": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key list retrieval fails when an invalid page size is provided, uniqueIdentifier=TC_PMS_GetListOfApiKey_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_with_invalid_sortType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_with_invalid_sortType_Neg, endPoint=/v1/partnermanager/partner-api-keys?sortType={sortType}, role=partnerauth, templateFields=null, input={ "sortType": "cas", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key list retrieval fails when an invalid sort type is provided, uniqueIdentifier=TC_PMS_GetListOfApiKey_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_with_negative_pageNo_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_with_negative_pageNo_Neg, endPoint=/v1/partnermanager/partner-api-keys?pageNo={pageNo}, role=partnerauth, templateFields=null, input={ "pageNo": "-1", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key list retrieval fails when a negative page number is provided, uniqueIdentifier=TC_PMS_GetListOfApiKey_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_with_negative_pageSize_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_with_negative_pageSize_Neg, endPoint=/v1/partnermanager/partner-api-keys?pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "pageSize": "-5", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key list retrieval fails when a negative page size is provided, uniqueIdentifier=TC_PMS_GetListOfApiKey_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_with_partial_apiKeyLabel_value |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_with_partial_apiKeyLabel_value, endPoint=/v1/partnermanager/partner-api-keys?apiKeyLabel={apiKeyLabel}, role=partnerauth, templateFields=null, input={ "apiKeyLabel": "tyy1", "policyName": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key retrieval fails or returns no results when filtered with a partial apiKeyLabel value, uniqueIdentifier=TC_PMS_GetListOfApiKey_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_with_partial_orgName_value |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_with_partial_orgName_value, endPoint=/v1/partnermanager/partner-api-keys?orgName={orgName}, role=partnerauth, templateFields=null, input={ "orgName": "sp", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key retrieval fails or returns no results when filtered with a partial orgName value, uniqueIdentifier=TC_PMS_GetListOfApiKey_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_with_partial_partnerId_value |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_with_partial_partnerId_value, endPoint=/v1/partnermanager/partner-api-keys?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "partnerId": "A", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key retrieval fails or returns no results when filtered with a partial partnerId value, uniqueIdentifier=TC_PMS_GetListOfApiKey_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_with_partial_policyGroupName_value |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_with_partial_policyGroupName_value, endPoint=/v1/partnermanager/partner-api-keys?policyGroupName={policyGroupName}, role=partnerauth, templateFields=null, input={ "policyGroupName": "1", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key retrieval fails or returns no results when filtered with a partial policyGroupName value, uniqueIdentifier=TC_PMS_GetListOfApiKey_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_with_partial_policyName_value |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_with_partial_policyName_value, endPoint=/v1/partnermanager/partner-api-keys?policyName={policyName}, role=partnerauth, templateFields=null, input={ "policyName": "pqr", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key retrieval fails or returns no results when filtered with a partial policyName value, uniqueIdentifier=TC_PMS_GetListOfApiKey_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_with_random_data |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_with_random_data, endPoint=/v1/partnermanager/partner-api-keys?orgName={orgName}, role=partnerauth, templateFields=null, input={ "orgName": "zz6762j", "apiKeyLabel": "$REMOVE$", "policyName": "$REMOVE$", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key retrieval fails or returns no results when filtered with random data, uniqueIdentifier=TC_PMS_GetListOfApiKey_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_with_status_activated |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_with_status_activated, endPoint=/v1/partnermanager/partner-api-keys?status={status}, role=partnerauth, templateFields=null, input={ "status": "activated", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys with status Activated are successfully retrieved, uniqueIdentifier=TC_PMS_GetListOfApiKey_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_with_status_deactivated |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_with_status_deactivated, endPoint=/v1/partnermanager/partner-api-keys?status={status}, role=partnerauth, templateFields=null, input={ "status": "deactivated", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys with status Deactivated are successfully retrieved, uniqueIdentifier=TC_PMS_GetListOfApiKey_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_with_valid_ascending_sortType |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_with_valid_ascending_sortType, endPoint=/v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=partnerId&pageNo={pageNo}&pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "sortType": "ASC", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "10", "pageNo": "0", "status": "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved in ascending order when a valid sort type is provided, uniqueIdentifier=TC_PMS_GetListOfApiKey_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_with_valid_descending_sortType |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_with_valid_descending_sortType, endPoint=/v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=orgName&pageNo={pageNo}&pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "sortType": "DESC", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "10", "pageNo": "0", "status": "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved in descending order when a valid sort type is provided, uniqueIdentifier=TC_PMS_GetListOfApiKey_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetListOfApiKey_without_authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetListOfApiKey_without_authentication_Neg, endPoint=/v1/partnermanager/partner-api-keys, role=invalidtoken, templateFields=null, input={ }, output= { "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API key list retrieval fails without authentication, uniqueIdentifier=TC_PMS_GetListOfApiKey_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DownloadRootCertificate_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| DownloadRootCertificate |
| Testcase Input |
| testCaseName=Pms_DownloadRootCertificate_allValid_smoke, endPoint=/v1/partnermanager/trust-chain-certificates/{certificateId}/certificateFile, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/DownloadRootCertificate/downloadRootCertificate, outputTemplate=pms/DownloadRootCertificate/downloadRootCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the root certificate is successfully downloaded with all valid inputs, uniqueIdentifier=TC_PMS_DownloadRootCertificate_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicense_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicense_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "licenseKeyStatus": "ACTIVE" }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP partner license is successfully generated with a valid SID when all inputs are valid, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicense_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicense_All_Valid_Smoke_without_PolicyID_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicense_All_Valid_Smoke_without_PolicyID_sid, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "policyId": "$REMOVE$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "partnerId": "$ID:MISPPartnerRegistration_Without_PolicyGroup_Smoke_sid_partnerId$", "licenseKeyStatus": "ACTIVE" }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP partner license is successfully generated with a valid SID even when the policy ID is not provided, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicense_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicense_with_Empty_PolicyId_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicense_with_Empty_PolicyId_sid, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_For_Without_PolicyId_Smoke_Sid_partnerId$", "policyId": "", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "partnerId": "$ID:MISPPartnerRegistration_For_Without_PolicyId_Smoke_Sid_partnerId$", "licenseKeyStatus": "ACTIVE" }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when the policy ID is left empty even if a valid SID is provided, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicense_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicense_with_MisplicenseKeyName_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicense_with_MisplicenseKeyName_sid, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_valid_langcode_Arabic_sid_partnerId$", "policyId": "$REMOVE$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "partnerId": "$ID:MISPPartnerRegistration_valid_langcode_Arabic_sid_partnerId$", "licenseKeyStatus": "ACTIVE" }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP partner license is successfully generated when a valid license key name is provided along with a valid SID, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicense_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicense_with_Numeric_MisplicenseKeyName_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicense_with_Numeric_MisplicenseKeyName_sid, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Max_AddressField_sid_partnerId$", "policyId": "$REMOVE$", "licenseKeyName": "1234", "expiryDate": "$EXPIRYDATE$" }, output={ "partnerId": "$ID:MISPPartnerRegistration_Max_AddressField_sid_partnerId$", "licenseKeyStatus": "ACTIVE" }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP partner license is successfully generated when the license key name contains numeric characters, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicense_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicense_without_PolicyGroup_sid |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicense_without_PolicyGroup_sid, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_Empty_PolicyGroup_sid_partnerId$", "policyId": "$REMOVE$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "partnerId": "$ID:MISPPartnerRegistration_Empty_PolicyGroup_sid_partnerId$", "licenseKeyStatus": "ACTIVE" }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when the policy group is not provided, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicense_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_Already_registered_LicenseKeyName |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Already_registered_LicenseKeyName, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_MSP_424" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when the license key name has already been registered, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_Empty_LicenseKeyName |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Empty_LicenseKeyName, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": " ", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_MSP_422" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when the license key name is left empty, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_Empty_RequestID |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Empty_RequestID, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": " ", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when the request ID is left empty, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_Empty_expiryDate |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Empty_expiryDate, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": " " }, output={ "errors": [ { "errorCode": "PMS_MSP_436" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when the expiry date is left empty, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_Empty_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Empty_partnerId, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": " ", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_MSP_423" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when the partner ID is left empty, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_Invalid_RequestID |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Invalid_RequestID, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when an invalid request ID is provided, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_Invalid_Version |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Invalid_Version, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "10", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when an invalid version is provided, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_Invalid_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Invalid_partnerId, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pmsapiautomation123456", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_MSP_429" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when an invalid partner ID is provided, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_Null_RequestID |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Null_RequestID, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "null", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when the request ID is null, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_Null_Version |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Null_Version, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "null", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when the version is set to null, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_Past_expiryDate |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Past_expiryDate, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2025-10-08" }, output={ "errors": [ { "errorCode": "PMS_MSP_425" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when the expiry date is set in the past, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_Version_value0 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Version_value0, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when an invalid version value 0 is provided, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_Version_value1 |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_Version_value1, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when an unsupported version value 1 is provided, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_invalid_LicenseKeyName |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_invalid_LicenseKeyName, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "&^%$$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when an invalid license key name is provided, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_null_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_null_partnerId, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "null", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_MSP_429" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when the partner ID is set to null, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_past_requestTime |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_past_requestTime, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "2024-10-09T11:33:18.573Z", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when the request time is set in the past, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_without_Access_Token |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_without_Access_Token, endPoint=/v1/partnermanager/misp-licenses, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when no access token is provided, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_without_RequestID |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_without_RequestID, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when the request ID is not provided, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_without_Version |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_without_Version, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when the version is not provided, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GenerateMISPPartnerLicenseNegativeScenarios_without_requestTime |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePostForAutoGenId |
| Testcase Input |
| testCaseName=Pms_GenerateMISPPartnerLicenseNegativeScenarios_without_requestTime, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.misp.generate.license.post", "version": "1.0", "requestTime": "$REMOVE$", "partnerId": "pms-111555", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/MispLicenseV3/GenerateMISPPartnerLicense/GenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that generating a MISP partner license fails when the request time is not provided, uniqueIdentifier=TC_PMS_GenerateMISPPartnerLicenseNegativeScenarios_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateMISPLicense |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateMISPLicense, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_without_PolicyGroup_sid_partnerId$", "policyId": "$REMOVE$", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_without_PolicyGroup_sid_licenseKeyName$", "status": "De-Activate" }, output={ }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicenseResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP license is successfully deactivated with valid inputs, uniqueIdentifier=TC_PMS_DeactivateMISPLicense_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateMISPPartner |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateMISPPartner, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "$ID:MISPPartnerRegistration_valid_langcode_Arabic_sid_partnerId$", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner is successfully deactivated with valid inputs, uniqueIdentifier=TC_PMS_DeactivateMISPPartner_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_All_Valid_Smoke, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "0", "pageSize": "8", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all MISP partner licenses are retrieved successfully for a valid request, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_ByValidPartnerId |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_ByValidPartnerId, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner license is retrieved successfully for a valid Partner ID, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_ByValidPartnerId_And_Status_Activated |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_ByValidPartnerId_And_Status_Activated, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "activated", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner license is retrieved successfully for a valid partner ID with status set to Activated, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_ByValidPartnerId_And_Status_Deactivated |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_ByValidPartnerId_And_Status_Deactivated, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "deactivated", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner license is retrieved successfully for a valid partner ID with status set to Deactivated, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_With_Numeric_LicenseKeyName |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_With_Numeric_LicenseKeyName, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$ID:GenerateMISPPartnerLicense_with_Numeric_MisplicenseKeyName_sid_licenseKeyName$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when filtering using a numeric license key name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_With_PageSize_Without_PageNumber |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_With_PageSize_Without_PageNumber, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "5", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when a page size is provided but no page number is specified, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_With_Pagination_And_Valid_PartnerId |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_With_Pagination_And_Valid_PartnerId, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "0", "pageSize": "2", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully for a valid partner ID using pagination parameters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_With_PartnerId_And_PolicyName |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_With_PartnerId_And_PolicyName, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_name$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when filtering by both a valid partner ID and policy name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_With_PolicyGroupName_And_Status_Activated |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_With_PolicyGroupName_And_Status_Activated, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_policyGroupName$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "activated", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when filtering by policy group name with status set to Activated, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_With_PolicyName_And_Pagination |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_With_PolicyName_And_Pagination, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "0", "pageSize": "2", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_name$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when filtering by policy name and using pagination parameters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_With_PolicyName_And_Valid_OrgName |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_With_PolicyName_And_Valid_OrgName, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_organizationName$", "policyGroupName": "$REMOVE$", "policyName": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_name$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when filtering by both policy name and a valid organization name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_Default_Pagination |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_Default_Pagination, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseInput, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully using default pagination settings when no pagination parameters are provided, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_ExpiryPeriod_NotPassing_Any_Value |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_ExpiryPeriod_NotPassing_Any_Value, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when the expiryPeriod parameter is not provided, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_ExpiryPeriod_Passing_Valid_Value |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_ExpiryPeriod_Passing_Valid_Value, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "15" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when a valid expiryPeriod value is provided, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_Maximum_ExpiryPeriod |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_Maximum_ExpiryPeriod, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "30" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when the maximum allowed expiryPeriod value is provided, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_Minimum_ExpiryPeriod |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_Minimum_ExpiryPeriod, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "1" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when the minimum allowed expiryPeriod value is provided, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_MispLicenseKeyName |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_MispLicenseKeyName, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$ID:GenerateMISPPartnerLicense_with_Numeric_MisplicenseKeyName_sid_licenseKeyName$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when filtering by MISP license key name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_Nofilter_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_Nofilter_Valid_Smoke, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseInput, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all MISP partner licenses are retrieved successfully when no filter criteria are applied, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_ORGName |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_ORGName, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_organizationName$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when filtering by organization name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_Pagination |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_Pagination, endPoint=/v1/partnermanager/misp-licenses?pageNo=0&pageSize=2, role=partneradmin, templateFields=null, input={ "pageNo": "0", "pageSize": "2", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully using pagination parameters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_PolicyGroupName |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_PolicyGroupName, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_policyGroupName$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when filtering by policy group name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_PolicyName |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_PolicyName, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_name$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when filtering by policy name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_SortField_And_Ascending_Order |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_SortField_And_Ascending_Order, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "mispLicenseKeyName", "sortType": "asc", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when sorted by the specified sort field in ascending order, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_SortField_And_Descending_Order |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_SortField_And_Descending_Order, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "mispLicenseKeyName", "sortType": "desc", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when sorted by the specified sort field in descending order, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_SortField_As_ExpiryDateTime_And_Ascending_Order |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_SortField_As_ExpiryDateTime_And_Ascending_Order, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "expiryDateTime", "sortType": "asc", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when sorted by ExpiryDateTime in ascending order, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_SortField_As_ExpiryDateTime_And_Descending_Order |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_SortField_As_ExpiryDateTime_And_Descending_Order, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "expiryDateTime", "sortType": "desc", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when sorted by ExpiryDateTime in descending order, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_SortField_As_PartnerId_And_Ascending_Order |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_SortField_As_PartnerId_And_Ascending_Order, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "partnerId", "sortType": "asc", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when sorted by PartnerId in ascending order, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_Status_Activated |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_Status_Activated, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "activated", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when the status filter is set to Activated, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicense_with_Status_Deactived |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicense_with_Status_Deactived, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "deactivated", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully when the status filter is set to Deactivate, uniqueIdentifier=TC_PMS_GetMISPPartnerLicense_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Deactivated_PartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Deactivated_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$ID:MISPPartnerRegistration_valid_langcode_Arabic_sid_partnerId$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a deactivated partner ID, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_41, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Decimal_ExpiryPeriod_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Decimal_ExpiryPeriod_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "15.5" }, output={ "responseCode": "400" }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a decimal value for the expiryPeriod parameter, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Decimal_PageNo_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Decimal_PageNo_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "1.2", "pageSize": "8", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "responseCode": "400" }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a decimal value for the page number, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_34, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Empty_String_PolicyGroupName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Empty_String_PolicyGroupName_Neg, endPoint=/v1/partnermanager/misp-licenses?policyGroupName="", role=partneradmin, templateFields=null, input={ }, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseInput, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an empty string for the policy group name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Empty_String_PolicyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Empty_String_PolicyName_Neg, endPoint=/v1/partnermanager/misp-licenses?policyName="", role=partneradmin, templateFields=null, input={ }, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseInput, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an empty string for the policy name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Exceeding_Maximum_ExpiryPeriod_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Exceeding_Maximum_ExpiryPeriod_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "31" }, output={ "responseCode": "400" }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an expiryPeriod value exceeding the maximum allowed limit, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Inactive_PartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Inactive_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "pms-111545", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an inactive partner ID, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Invalid_MispLicenseKeyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_MispLicenseKeyName_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "INVALID_KEY", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid MISP license key name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Invalid_OrgName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_OrgName_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "UnknownOrg", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid organization name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PageNo_Format_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PageNo_Format_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "abc", "pageSize": "2", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "responseCode": "400" }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid page number format, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PageNo_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PageNo_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "10089", "pageSize": "0", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid page number, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PageSize_Format_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PageSize_Format_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "0", "pageSize": "abc", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "responseCode": "400" }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid page size format, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "invalid_partnerid", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid partner ID, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PolicyGroupName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PolicyGroupName_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "Invalid_policygroupname", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid policy group name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PolicyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_PolicyName_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "Invalid_Policy", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid policy name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Invalid_SortFieldName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Invalid_SortFieldName_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "invalidFieldName", "sortType": "asc", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid sort field name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Large_PageSizeNumber_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Large_PageSizeNumber_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "500", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an excessively large page size value, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_39, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Negative_ExpiryPeriod_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Negative_ExpiryPeriod_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "-10" }, output={ "responseCode": "400" }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a negative expiryPeriod value, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Negative_PageNo_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Negative_PageNo_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "-1", "pageSize": "8", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a negative page number, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Negative_PageSize_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Negative_PageSize_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "-5", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a negative page size, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_No_Status_Selected_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_No_Status_Selected_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "", "expiryPeriod": "$REMOVE$" }, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses without selecting any status filter, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_36, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_NonInteger_PageNo_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_NonInteger_PageNo_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "abc", "pageSize": "8", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "responseCode": "400" }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a non-integer value for the page number, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_33, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_NonInteger_PageSizeNumber_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_NonInteger_PageSizeNumber_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "abc", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "responseCode": "400" }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a non-integer value for the page size, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_40, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Null_OrgName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Null_OrgName_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "null", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a null value for the organization name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_37, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Numeric_SortFieldName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Numeric_SortFieldName_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "1234", "sortType": "asc", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a numeric value as the sort field name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_30, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_SortFieldName_Without_SortType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_SortFieldName_Without_SortType_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "mispLicenseKeyName", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses by providing a sort field name without specifying a sort type, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_SortFieldName_and_Invalid_SortType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_SortFieldName_and_Invalid_SortType_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "mispLicenseKeyName", "sortType": "random", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_358" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a valid sort field name but an invalid sort type, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_SortType_Without_SortFieldName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_SortType_Without_SortFieldName_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "asc", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses by providing a sort type without specifying a sort field name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_SpecialCharacter_In_SortType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_SpecialCharacter_In_SortType_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "mispLicenseKeyName", "sortType": "as@", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_358" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using special characters in the sort type parameter, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_32, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_MispLicenseKeyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_MispLicenseKeyName_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "Key@@!!$$.", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a MISP license key name containing special characters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_OrgName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_OrgName_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "Org@@!!$$.", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an organization name containing special characters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_PartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "Par@@!!$$.", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a partner ID containing special characters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_PolicyGroupName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_PolicyGroupName_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "Gr@Up@!!$$.", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a policy group name containing special characters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_PolicyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_PolicyName_Neg, endPoint=/v1/partnermanager/misp-licenses?policyName=P@!!cY$$., role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "P@!!cY$$.", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a policy name containing special characters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_SortFieldName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Special_Char_SortFieldName_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "@#$%", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a sort field name containing special characters, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Unsupported_SortType_Value_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Unsupported_SortType_Value_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "mispLicenseKeyName", "sortType": "ascending", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_358" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an unsupported sort type value, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_31, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Valid_OrgName_and_Invalid_PolicyGroupName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Valid_OrgName_and_Invalid_PolicyGroupName_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_organizationName$", "policyGroupName": "InvalidGroup123", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a valid organization name but an invalid policy group name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Valid_PolicyName_And_Invalid_OrgName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Valid_PolicyName_And_Invalid_OrgName_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "UnknownOrg", "policyGroupName": "$REMOVE$", "policyName": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_name$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a valid policy name but an invalid organization name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_38, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_VeryLarge_PageNo_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_VeryLarge_PageNo_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "9999", "pageSize": "8", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "response": { "pageNo": "0", "pageSize": "0" } }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicenseOutputResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an excessively large page number, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_35, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_with_Zero_PageSize_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_with_Zero_PageSize_Neg, endPoint=/v1/partnermanager/misp-licenses, role=partneradmin, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "0", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses with a page size of zero, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseNegTC_without_Access_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseNegTC_without_Access_Token_Neg, endPoint=/v1/partnermanager/misp-licenses, role=invalidtoken, templateFields=null, input={ "pageNo": "0", "pageSize": "8", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "policyGroupName": "$REMOVE$", "policyName": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicense/GetMISPPartnerLicense, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses without providing an access token, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseNegTC_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseByPartnerId_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerId_All_Valid_Smoke, endPoint=/v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerIdResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner licenses are retrieved successfully for a valid partner ID with all required parameters as part of a smoke test, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerId_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_Auth_PartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_Auth_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ "errors": [ { "errorCode": "PMS_MSP_427" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a partner ID that is not authorized, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_DiffOrg_PartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_DiffOrg_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$REMOVE$", "policyId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_MSP_427" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a partner ID belonging to a different organization, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_Invalid_Access_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_Invalid_Access_Token_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}, role=invalidtoken, templateFields=null, input={ "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses by partner ID using an invalid access token, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_Invalid_PartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_Invalid_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "@@invalid-partnerId", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ "errors": [ { "errorCode": "PMS_MSP_429" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using an invalid partner ID, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_NotRegistered_PartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_NotRegistered_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "pms-222222", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ "errors": [ { "errorCode": "PMS_MSP_429" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a partner ID that is not registered, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_NotUploaded_Certificate_PartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_NotUploaded_Certificate_PartnerId_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "$ID:MISPPartnerRegistration_With_Not_Uploading_Certificate_Smoke_Sid_partnerId$", "licenseKeyName": "$REMOVE$", "policyId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_MSP_427" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses for a partner ID whose certificate has not been uploaded, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_PartnerId_And_Without_LicenseKeyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_PartnerId_And_Without_LicenseKeyName_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "$ID:MISPPartnerRegistration_Empty_PolicyGroup_sid_partnerId$", "licenseKeyName": "", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ "errors": [ { "errorCode": "PMS_MSP_427" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses using a valid partner ID but without providing a license key name, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_PartnerId_Null_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetMISPPartnerLicenseByPartnerIdNegTC_With_PartnerId_Null_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}?mispLicenseKeyName={licenseKeyName}&policyId={policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "null", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ "errors": [ { "errorCode": "PMS_MSP_429" } ] }, inputTemplate=pms/MispLicenseV3/GetMISPPartnerLicenseByPartnerId/GetMISPPartnerLicenseByPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to retrieve MISP partner licenses with a null partner ID, uniqueIdentifier=TC_PMS_GetMISPPartnerLicenseByPartnerIdNegTC_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchMispLicense_Blank_SortField |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchMispLicense_Blank_SortField, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "", "sortType": "ASC" }], "pageStart": 0, "pageFetch": 1, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving MISP licenses fails when the sort field is left blank in the search request, uniqueIdentifier=TC_PMS_SearchMispLicense_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchMispLicense_Invalid_NegPageFetch |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchMispLicense_Invalid_NegPageFetch, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "createdDateTime", "sortType": "ASC" }], "pageStart": 0, "pageFetch": -1, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-313" } ] }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving MISP licenses fails when an invalid or negative page number is provided for pagination, uniqueIdentifier=TC_PMS_SearchMispLicense_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchMispLicense_Invalid_NegPageStart |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchMispLicense_Invalid_NegPageStart, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "createdDateTime", "sortType": "ASC" }], "pageStart": -1, "pageFetch": 1, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-313" } ] }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving MISP licenses fails when an invalid start page value is provided for pagination, uniqueIdentifier=TC_PMS_SearchMispLicense_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchMispLicense_Invalid_SortField_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchMispLicense_Invalid_SortField_neg, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "createddDateTime", "sortType": "ASC" }], "pageStart": 0, "pageFetch": 1, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-357" } ] }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving MISP licenses fails when an invalid sort field is provided in the search request, uniqueIdentifier=TC_PMS_SearchMispLicense_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchMispLicense_Invalid_SortType_neg |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchMispLicense_Invalid_SortType_neg, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "createdDateTime", "sortType": "asdf" }], "pageStart": 0, "pageFetch": 1, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving MISP licenses fails when an invalid sort type is provided in the search request, uniqueIdentifier=TC_PMS_SearchMispLicense_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchMispLicense_Valid_Filter_Name |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchMispLicense_Valid_Filter_Name, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "createdDateTime", "sortType": "ASC" }], "pageStart": 0, "pageFetch": 10, "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that MISP licenses are retrieved successfully when searched using a valid filter by name, uniqueIdentifier=TC_PMS_SearchMispLicense_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_SearchMispLicense_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_SearchMispLicense_Valid_Smoke, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [], "sort": [{ "sortField": "createdDateTime", "sortType": "ASC" }], "pageStart": 0, "pageFetch": 10, "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that MISP licenses are retrieved successfully when searched using valid search criteria, uniqueIdentifier=TC_PMS_SearchMispLicense_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_FilterMispLicense_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_FilterMispLicense_All_Valid_Smoke, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "all", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "isActive", "fieldValue": "true" }, { "fieldID": "isActive", "fieldValue": "false" } ], "errors": null }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all MISP licenses are retrieved successfully when a valid filter request is submitted, uniqueIdentifier=TC_PMS_FilterMispLicense_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_FilterMispLicense_Blank_FilterType |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_FilterMispLicense_Blank_FilterType, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving MISP licenses fails when the filter type is left blank, uniqueIdentifier=TC_PMS_FilterMispLicense_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_FilterMispLicense_InValid_Empty_columnName |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_FilterMispLicense_InValid_Empty_columnName, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "unique", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving MISP licenses fails when the column name in the filter is left empty, uniqueIdentifier=TC_PMS_FilterMispLicense_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_FilterMispLicense_InValid_FilterType |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_FilterMispLicense_InValid_FilterType, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "iSActive", "type": "between", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving MISP licenses fails when an invalid filter type is provided, uniqueIdentifier=TC_PMS_FilterMispLicense_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_FilterMispLicense_InValid_columnName |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_FilterMispLicense_InValid_columnName, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "lang_code", "type": "unique", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving MISP licenses fails when an invalid column name is provided in the filter, uniqueIdentifier=TC_PMS_FilterMispLicense_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_FilterMispLicense_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| SimplePost |
| Testcase Input |
| testCaseName=Pms_FilterMispLicense_Valid_Smoke, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "unique", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "isActive", "fieldValue": "true" }, { "fieldID": "isActive", "fieldValue": "false" } ], "errors": null }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that MISP licenses are retrieved successfully when filtered using valid criteria, uniqueIdentifier=TC_PMS_FilterMispLicense_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerApiKeyRequest_InValid_partnerId_neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerApiKeyRequest_InValid_partnerId_neg, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/request, role=partner, templateFields=null, input={ "partnerId": "fqgfg" }, output={ "errors": [ { "errorCode": "PMS_PRT_006" } ] }, inputTemplate=pms/GetPartnerApiKeyRequest/getPartnerApiKeyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API key requests fails when an invalid partner ID is provided, uniqueIdentifier=TC_PMS_GetPartnerApiKeyRequest_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetBioExtractors_InValid_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetBioExtractors_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId": "afgebv", "policyId": "mpolicy-default-auth" }, output={ "errors": [ { "errorCode": "PMS_PRT_064", "message": "No details found" } ] }, inputTemplate=pms/GetBioExtractors/getBioExtractors, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that bio extractor retrieval fails no data when an invalid partnerId is provided, uniqueIdentifier=TC_PMS_GetBioExtractors_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetBioExtractors_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetBioExtractors_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId": "mpartner-default-auth", "policyId": "mpolicy-default-auth" }, output={ }, inputTemplate=pms/GetBioExtractors/getBioExtractors, outputTemplate=pms/GetBioExtractors/getBioExtractorsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all bio extractor details are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetBioExtractors_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateBioExtractors_InValid_PolicyId |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_CreateBioExtractors_InValid_PolicyId, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId": "mpartner-default-auth", "policyId": "vdsfhfx", "attributeName": "iris", "biometric": "iris", "provider": "mock", "version": "1.1", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_061" } ] }, inputTemplate=pms/CreateBioExtractors/createBioExtractors, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that bio extractor creation fails when an invalid policy ID is provided, uniqueIdentifier=TC_PMS_CreateBioExtractors_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_CreateBioExtractors_InValid_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_CreateBioExtractors_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId": "asvgasfbkasdm", "policyId": "mpolicy-default-auth", "attributeName": "iris", "biometric": "iris", "provider": "mock", "version": "1.1", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_061" } ] }, inputTemplate=pms/CreateBioExtractors/createBioExtractors, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that bio extractor creation fails when an invalid partner ID is provided, uniqueIdentifier=TC_PMS_CreateBioExtractors_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MapPartnerAndPolicytoCredentialType_AllValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_AllValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "credentialType": "auth", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_name$" }, output={ }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a partner and policy are successfully mapped to a credential type when a valid request is submitted, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MapPartnerAndPolicytoCredentialType_InValid_credentialType |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_InValid_credentialType, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partner, templateFields=null, input={ "partnerId": "mpartner-default-auth", "credentialType": "sfdgsaefhb", "policyId": "mpolicy-default-auth" }, output={ "errors": [ { "errorCode": "PMS_PRT_072" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that mapping a partner and policy to a credential type fails when an invalid credential type is provided, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MapPartnerAndPolicytoCredentialType_InValid_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partner, templateFields=null, input={ "partnerId": "asvgasfbkasdm", "credentialType": "auth", "policyId": "mpolicy-default-auth" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that mapping a partner and policy to a credential type fails when an invalid or non-existent partner ID is provided, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MapPartnerAndPolicytoCredentialType_InValid_policyId |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_InValid_policyId, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partner, templateFields=null, input={ "partnerId": "mpartner-default-auth", "credentialType": "auth", "policyId": "asrhtaeh" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that mapping a partner and policy to a credential type fails when an invalid policy ID is provided, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MapPartnerAndPolicytoCredentialType_MapTo_Inactive_Policy_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_MapTo_Inactive_Policy_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "credentialType": "auth", "policyId": "$ID:DefinePolicy_RandomTokenType_All_Valid_Smoke_sid_name$" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that mapping a partner and credential type to an inactive policy fails, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MapPartnerAndPolicytoCredentialType_MapTo_NotAllowed_Partner_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_MapTo_NotAllowed_Partner_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_MispLicense_Msip_Smoke_sid_partnerId$", "credentialType": "auth", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_name$" }, output={ "errors": [ { "errorCode": "PMS_PRT_070" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Mapping between Partner and Policy to CredentialType Partner while keeping not allowed partner, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_MapPartnerAndPolicytoCredentialType_Map_Again_Dublicate_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithOnlyPathParam |
| Testcase Input |
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_Map_Again_Dublicate_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "credentialType": "auth", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_name$" }, output={ "errors": [ { "errorCode": "PMS_PRT_007" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that mapping a partner and policy to a credential type fails when a duplicate mapping already exists, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPolicyforMappedPartnerAndCredentialtype_AllValid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPolicyforMappedPartnerAndCredentialtype_AllValid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "credentialType": "auth" }, output={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "credentialType": "auth", "policyName": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_name$" }, inputTemplate=pms/GetPolicyforMappedPartnerAndCredentialtype/getPolicyforMappedPartnerAndCredentialtype, outputTemplate=pms/GetPolicyforMappedPartnerAndCredentialtype/getPolicyforMappedPartnerAndCredentialtypeResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all policies are retrieved successfully for a valid partner and credential type mapping, uniqueIdentifier=TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPolicyforMappedPartnerAndCredentialtype_InValid_credentialType |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPolicyforMappedPartnerAndCredentialtype_InValid_credentialType, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid_partnerId$", "credentialType": "asfgr" }, output={ "errors": [ { "errorCode": "PMS_PRT_064" } ] }, inputTemplate=pms/GetPolicyforMappedPartnerAndCredentialtype/getPolicyforMappedPartnerAndCredentialtype, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving policies fails when an invalid credential type is provided for a partner–credential type mapping, uniqueIdentifier=TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPolicyforMappedPartnerAndCredentialtype_InValid_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPolicyforMappedPartnerAndCredentialtype_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies, role=partner, templateFields=null, input={ "partnerId": "asdg", "credentialType": "auth" }, output={ "errors": [ { "errorCode": "PMS_PRT_064" } ] }, inputTemplate=pms/GetPolicyforMappedPartnerAndCredentialtype/getPolicyforMappedPartnerAndCredentialtype, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving policies fails when an invalid partner ID is provided for a partner–credential type mapping, uniqueIdentifier=TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetRoles_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetRoles_allValid_smoke, endPoint=/v1/partnermanager/roles, role=partner, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetRoles/getRoles, outputTemplate=pms/GetRoles/getRolesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all user roles are retrieved successfully for a valid request, uniqueIdentifier=TC_PMS_GetRoles_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ActivateDeactivatePartner_activate_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ActivateDeactivatePartner_activate_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$", "status": "Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that an inactive partner is successfully activated when a valid activate request is submitted, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ActivateDeactivatePartner_deactivate_MISP3 |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ActivateDeactivatePartner_deactivate_MISP3, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_MispLicense_Msip_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP3 partner is successfully deactivated when a valid deactivate request is submitted, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ActivateDeactivatePartner_deactivate_Tech-1233 |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ActivateDeactivatePartner_deactivate_Tech-1233, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_for_Get_ApiKey_With_Deactive_Partner_sid_partnerId$", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the partner with ID Tech-1233 is successfully deactivated when a valid deactivate request is submitted, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ActivateDeactivatePartner_deactivate_Tech_321 |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ActivateDeactivatePartner_deactivate_Tech_321, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Deactive_Partner_sid_partnerId$", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the partner with ID Tech_321 is successfully deactivated when a valid deactivate request is submitted, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ActivateDeactivatePartner_deactivate_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ActivateDeactivatePartner_deactivate_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_credentialpartner_All_Valid_Smoke_sid_partnerId$", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that an active partner is successfully deactivated when a valid deactivate request is submitted, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ActivateDeactivatePartner_invalid_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_ActivateDeactivatePartner_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "asdfgrwg", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "errors": [ { "errorCode": "PMS_PMP_005" } ] }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner activation or deactivation fails when an invalid partner ID is provided, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetApiKeyRequests_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetApiKeyRequests_allValid_smoke, endPoint=/v1/partnermanager/partners/apikey, role=partner, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetApiKeyRequests/getApiKeyRequests, outputTemplate=pms/GetApiKeyRequests/getApiKeyRequestsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all API key requests are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetApiKeyRequests_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_AddContact_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| AuditValidator |
| Testcase Input |
| testCaseName=Pms_AddContact_All_Valid_Smoke, endPoint=SELECT module_name,cr_by FROM audit.app_audit_log where module_name LIKE '%partner%' order by action_dtimes desc LIMIT 5, role=audit, templateFields=[partnerQuery, partner service], input={ }, output={ "module_name": "partner service" "cr_by": "111997" }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/authPartner/AddContacts/addContactResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a contact is successfully added when all input parameters are valid, uniqueIdentifier=TC_PMS_addContact_01, additionalDependencies=null |
| Testcase Name |
|---|
| Pms_GetPolicyForApiKey_InValid_apiKey |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPolicyForApiKey_InValid_apiKey, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}, role=partner, templateFields=null, input={ "partnerId": "110124", "apiKey": "dhbg" }, output={ "errors": [ { "errorCode": "PMS_PMP_009" } ] }, inputTemplate=pms/GetPolicyForApiKey/getPolicyForApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving policies fails when an invalid API key is provided, uniqueIdentifier=TC_PMS_GetPolicyForApiKey_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPolicyForApiKey_InValid_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPolicyForApiKey_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}, role=partner, templateFields=null, input={ "partnerId": "fqgfg", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$" }, output={ "errors": [ { "errorCode": "PMS_PMP_009" } ] }, inputTemplate=pms/GetPolicyForApiKey/getPolicyForApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving policies for an API key fails when an invalid partner ID is provided, uniqueIdentifier=TC_PMS_GetPolicyForApiKey_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPolicyForApiKey_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPolicyForApiKey_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$" }, output={ "partnerID": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$" }, inputTemplate=pms/GetPolicyForApiKey/getPolicyForApiKey, outputTemplate=pms/GetPolicyForApiKey/getPolicyForApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all policies associated with a valid API key are retrieved successfully, uniqueIdentifier=TC_PMS_GetPolicyForApiKey_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyAgainstApiKey_allValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyAgainstApiKey_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$", "oldPolicyID": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_id$", "newPolicyID": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKey, outputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a Policy against an API Key with all valid inputs is successful and the changes are reflected correctly, uniqueIdentifier=TC_PMS_UpdatePolicyAgainstApiKey_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyAgainstApiKey_invalid_OldPolicyId |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyAgainstApiKey_invalid_OldPolicyId, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$", "oldPolicyID": "asfbgt", "newPolicyID": "$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_50" } ] }, inputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a Policy against an API Key fails when an invalid oldPolicyId is provided, uniqueIdentifier=TC_PMS_UpdatePolicyAgainstApiKey_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyAgainstApiKey_invalid_apiKey |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyAgainstApiKey_invalid_apiKey, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "apiKey": "asvbgn", "oldPolicyID": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "newPolicyID": "$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_50" } ] }, inputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a Policy against an API Key fails when an invalid apiKey is provided, uniqueIdentifier=TC_PMS_UpdatePolicyAgainstApiKey_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyAgainstApiKey_invalid_newPolicyId |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyAgainstApiKey_invalid_newPolicyId, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$", "oldPolicyID": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "newPolicyID": "INVALID", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_014" } ] }, inputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a Policy against an API Key fails when an invalid newPolicyId is provided, uniqueIdentifier=TC_PMS_UpdatePolicyAgainstApiKey_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyAgainstApiKey_invalid_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyAgainstApiKey_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies, role=partner, templateFields=null, input={ "partnerId": "asgfdg", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$", "oldPolicyID": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "newPolicyID": "$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_50" } ] }, inputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a Policy against an API Key fails when an invalid partnerId is provided, uniqueIdentifier=TC_PMS_UpdatePolicyAgainstApiKey_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_AddContact_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| AuditValidator |
| Testcase Input |
| testCaseName=Pms_AddContact_All_Valid_Smoke, endPoint=SELECT module_name,cr_by FROM audit.app_audit_log where module_name LIKE '%partner%' order by action_dtimes desc LIMIT 5, role=audit, templateFields=[partnerQuery, partner service], input={ }, output={ "module_name": "partner service" "cr_by": "111997" }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/authPartner/AddContacts/addContactResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a contact is successfully added when all input parameters are valid, uniqueIdentifier=TC_PMS_addContact_01, additionalDependencies=null |
| Testcase Name |
|---|
| Pms_UpdatePolicyGroupForPartner_AllValid_smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyGroupForPartner_AllValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/policygroup/{policygroupName}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_UpdatePolicyGroupForPartner_AllValid_Smoke_sid_partnerId$", "policygroupName": "$ID:UpdatePolicyGroup_activate_All_Valid_Smoke_Sid_name$" }, output={ "response": "$IGNORE$" }, inputTemplate=pms/UpdatePolicyGroupForPartner/updatePolicyGroupForPartner, outputTemplate=pms/UpdatePolicyGroupForPartner/updatePolicyGroupForPartnerResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a Policy Group for a Partner with all valid inputs is successful and the changes are reflected correctly, uniqueIdentifier=TC_PMS_UpdatePolicyGroupForPartner_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyGroupForPartner_InValid_ApprovedPartner |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyGroupForPartner_InValid_ApprovedPartner, endPoint=/v1/partnermanager/partners/{partnerId}/policygroup/{policygroupName}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "policygroupName": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_name$" }, output={ "errors": [ { "errorCode": "PMS_PRT_050" } ] }, inputTemplate=pms/UpdatePolicyGroupForPartner/updatePolicyGroupForPartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a Policy Group for a Partner fails when an invalid Partner is provided, uniqueIdentifier=TC_PMS_UpdatePolicyGroupForPartner_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyGroupForPartner_InValid_PolicyGroup |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyGroupForPartner_InValid_PolicyGroup, endPoint=/v1/partnermanager/partners/{partnerId}/policygroup/{policygroupName}, role=partner, templateFields=null, input={ "partnerId": "$ID:PartnerSelfRegistration_UpdatePolicyGroupForPartner_AllValid_Smoke_sid_partnerId$", "policygroupName": "dsfgeagb" }, output={ "errors": [ { "errorCode": "PMS_PRT_002" } ] }, inputTemplate=pms/UpdatePolicyGroupForPartner/updatePolicyGroupForPartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a Policy Group for a Partner fails when an invalid policyGroup is provided, uniqueIdentifier=TC_PMS_UpdatePolicyGroupForPartner_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdatePolicyGroupForPartner_InValid_partnerId |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdatePolicyGroupForPartner_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/policygroup/{policygroupName}, role=partner, templateFields=null, input={ "partnerId": "asfvgb", "policygroupName": "mosip policy group updated" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/UpdatePolicyGroupForPartner/updatePolicyGroupForPartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating a Policy Group for a Partner fails when an invalid partnerId is provided, uniqueIdentifier=TC_PMS_UpdatePolicyGroupForPartner_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_AddContact_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| AuditValidator |
| Testcase Input |
| testCaseName=Pms_AddContact_All_Valid_Smoke, endPoint=SELECT module_name,cr_by FROM audit.app_audit_log where module_name LIKE '%partner%' order by action_dtimes desc LIMIT 5, role=audit, templateFields=[partnerQuery, partner service], input={ }, output={ "module_name": "partner service" "cr_by": "111997" }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/authPartner/AddContacts/addContactResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a contact is successfully added when all input parameters are valid, uniqueIdentifier=TC_PMS_addContact_01, additionalDependencies=null |
| Testcase Name |
|---|
| Pms_DBValidator_All_Valid_Smoke_data_created_using_APIKEY |
| Testcase Dependency |
| [] |
| Class Name |
| DBValidator |
| Testcase Input |
| testCaseName=Pms_DBValidator_All_Valid_Smoke_data_created_using_APIKEY, endPoint=SELECT * FROM ida.api_key_data where, role=partner, templateFields=null, input={ "partner_id": "$REMOVE$", "policy_name": "$REMOVE$", "api_key_id": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$", "license_key": "$REMOVE$" }, output={ "module_name": "partner service", "cr_by": "Tech-123" }, inputTemplate=pms/DbValidatorTest/dbValidatorTest, outputTemplate=pms/DbValidatorTest/DbValidatorResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that data created using API Key module is correctly stored and consistent in the database, uniqueIdentifier=TC_PMS_DBValidator_03, additionalDependencies=null |
| Testcase Name |
|---|
| Pms_DBValidator_All_Valid_Smoke_data_created_using_Misp |
| Testcase Dependency |
| [] |
| Class Name |
| DBValidator |
| Testcase Input |
| testCaseName=Pms_DBValidator_All_Valid_Smoke_data_created_using_Misp, endPoint=SELECT * FROM ida.misp_license_data where, role=partner, templateFields=null, input={ "partner_id": "$REMOVE$", "policy_name": "$REMOVE$", "api_key_id": "$REMOVE$", "license_key": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKey$" }, output={ "module_name": "partner service", "cr_by": "pms-111555" }, inputTemplate=pms/DbValidatorTest/dbValidatorTest, outputTemplate=pms/DbValidatorTest/DbValidatorResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that data created using MISP module is correctly stored and consistent in the database, uniqueIdentifier=TC_PMS_DBValidator_04, additionalDependencies=null |
| Testcase Name |
|---|
| Pms_DBValidator_All_Valid_Smoke_data_created_using_PMS |
| Testcase Dependency |
| [] |
| Class Name |
| DBValidator |
| Testcase Input |
| testCaseName=Pms_DBValidator_All_Valid_Smoke_data_created_using_PMS, endPoint=SELECT * FROM ida.partner_data where, role=partner, templateFields=null, input={ "partner_id": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$", "policy_name": "$REMOVE$", "api_key_id": "$REMOVE$", "license_key": "$REMOVE$" }, output={ "module_name": "partner service", "cr_by": "111997" }, inputTemplate=pms/DbValidatorTest/dbValidatorTest, outputTemplate=pms/DbValidatorTest/DbValidatorResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that data created using PMS is correctly stored and consistent in the database, uniqueIdentifier=TC_PMS_DBValidator_01, additionalDependencies=null |
| Testcase Name |
|---|
| Pms_DBValidator_All_Valid_Smoke_data_created_using_Policy |
| Testcase Dependency |
| [] |
| Class Name |
| DBValidator |
| Testcase Input |
| testCaseName=Pms_DBValidator_All_Valid_Smoke_data_created_using_Policy, endPoint=SELECT * FROM ida.policy_data where, role=partner, templateFields=null, input={ "partner_id": "$REMOVE$", "policy_name": "mosip data share policy", "api_key_id": "$REMOVE$", "license_key": "$REMOVE$" }, output={ "module_name": "partner service", "cr_by": "111997" }, inputTemplate=pms/DbValidatorTest/dbValidatorTest, outputTemplate=pms/DbValidatorTest/DbValidatorResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that data created using Policy module is correctly stored and consistent in the database, uniqueIdentifier=TC_PMS_DBValidator_02, additionalDependencies=null |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicense_All_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicense_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2035-10-10" }, output={ }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicenseResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP partner license is successfully regenerated for a valid partner ID and all required parameters as part of a smoke test, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicense_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicense_With_Empty_PolicyId |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicense_With_Empty_PolicyId, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_with_Empty_PolicyId_sid_partnerId$", "policyId": "", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicenseResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license with an empty policy ID, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicense_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicense_Without_PolicyId |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicense_Without_PolicyId, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_without_PolicyID_sid_partnerId$", "policyId": "$REMOVE$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicenseResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license without providing a policy ID, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicense_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicense_with_valid_LicenseKeyName |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicense_with_valid_LicenseKeyName, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicenseResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner license is successfully regenerated when a valid license key name is provided, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicense_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicense_with_valid_PolicyId |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicense_with_valid_PolicyId, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:DefineMISPPolicy_All_Valid_Smoke_pms_sid_id$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicenseResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the MISP partner license is successfully regenerated when a valid policy ID is provided, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicense_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_Invalid_Access_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_Invalid_Access_Token_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license using an invalid access token, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_Empty_ExpiryDate_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Empty_ExpiryDate_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "" }, output={ "errors": [ { "errorCode": "PMS_MSP_436" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license with an empty expiry date, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_Empty_LicenseKeyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Empty_LicenseKeyName_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "errors": [ { "errorCode": "PMS_MSP_422" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license with an empty license key name, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_Empty_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license with an empty request time, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_Empty_Request_id_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Empty_Request_id_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license with an empty request ID, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_Existing_LicenseKeyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Existing_LicenseKeyName_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "errors": [ { "errorCode": "PMS_MSP_424" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license using a license key name that already exists, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_ExpiryDate_Less_Than_Current_Date_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_ExpiryDate_Less_Than_Current_Date_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "2025-09-08" }, output={ "errors": [ { "errorCode": "PMS_MSP_425" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license with an expiry date earlier than the current date, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_Invalid_PartnerID_Format_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Invalid_PartnerID_Format_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-@@111555", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "errors": [ { "errorCode": "PMS_MSP_439" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license using a partner ID with an invalid format, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_Invalid_PartnerID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Invalid_PartnerID_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-invalid", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "errors": [ { "errorCode": "PMS_MSP_439" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license using an invalid partner ID, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_Invalid_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Invalid_RequestTime_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "invalid-requesttime", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "responseCode": "400" }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/responseCode, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license using an invalid request time, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_Invalid_Request_id_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Invalid_Request_id_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "invalid-id", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license using an invalid request ID, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_Invalid_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Invalid_Version_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "invalid-version", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license using an invalid version value, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_LicenseKeyName_Exceeding_Max_Length_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_LicenseKeyName_Exceeding_Max_Length_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "MISP_API_Automation_License_Key_ThisLicenseKeyNameIsExceedingTheMaximumAllowedLengthWhichIsExpectedToBeLessThanOrEqualToFiftyCharacters_$TIMESTAMP$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "errors": [ { "errorCode": "PMS_MSP_435" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license using a license key name that exceeds the maximum allowed length, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_Missing_ExpiryDate_Field_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Missing_ExpiryDate_Field_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$" }, output={ "errors": [ { "errorCode": "PMS_MSP_436" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license with the expiry date field missing from the request, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_Missing_LicenseKeyName_Field_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Missing_LicenseKeyName_Field_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "errors": [ { "errorCode": "PMS_MSP_422" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license with the license key name field missing from the request, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_Missing_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_Missing_RequestTime_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$LICENSE_KEY_NAME$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license with the request time field missing from the request, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_NotApproved_PolicyID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_NotApproved_PolicyID_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "notapproved-policyId", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "errors": [ { "errorCode": "PMS_MSP_439" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license using a policy ID that has not been approved, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_SpecialCharacter_In_LicenseKeyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_SpecialCharacter_In_LicenseKeyName_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "MISP@#%$^&*!_License_Key11", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license using a license key name containing special characters, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_RegenerateMISPPartnerLicenseNegTC_with_SpecialCharacter_In_PolicyID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_RegenerateMISPPartnerLicenseNegTC_with_SpecialCharacter_In_PolicyID_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.regenerate.misp.license.put", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "453@@677", "licenseKeyName": "$LICENSE_KEY_NAME$", "expiryDate": "$EXPIRYDATE_10YEARS$" }, output={ "errors": [ { "errorCode": "PMS_MSP_439" } ] }, inputTemplate=pms/MispLicenseV3/RegenerateMISPPartnerLicense/RegenerateMISPPartnerLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API returns an error when attempting to regenerate a MISP partner license using a policy ID containing special characters, uniqueIdentifier=TC_PMS_RegenerateMISPPartnerLicenseNegTC_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateMISPPartnerLicense_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateMISPPartnerLicense_All_Valid_Smoke, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "De-Activate" }, output={ }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicenseResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a MISP partner license is successfully deactivated when a valid request is submitted, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicense_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateMISPPartnerLicenseNegTC_with_Empty_PolicyId_And_LicenseKeyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Empty_PolicyId_And_LicenseKeyName_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "", "licenseKeyName": "", "status": "De-Activate" }, output={ "errors": [ { "errorCode": "PMS_MSP_427" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that deactivating a MISP partner license fails when both the policy ID and license key name are left empty, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateMISPPartnerLicenseNegTC_with_Empty_PolicyId_And_Status_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Empty_PolicyId_And_Status_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "" }, output={ "errors": [ { "errorCode": "PMS_MSP_433" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that deactivating a MISP partner license fails when both the policy ID and status are left empty, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateMISPPartnerLicenseNegTC_with_Empty_PolicyId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Empty_PolicyId_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "De-Activate" }, output={ "errors": [ { "errorCode": "PMS_MSP_427" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that deactivating a MISP partner license fails when the policy ID is left empty, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateMISPPartnerLicenseNegTC_with_Invalid_Id_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Invalid_Id_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "invalid_id", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "De-Activate" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that deactivating a MISP partner license fails when an invalid license ID is provided, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateMISPPartnerLicenseNegTC_with_Invalid_PolicyId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Invalid_PolicyId_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "invalid_policyId", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "De-Activate" }, output={ "errors": [ { "errorCode": "PMS_MSP_427" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that deactivating a MISP partner license fails when an invalid policy ID is provided, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateMISPPartnerLicenseNegTC_with_Invalid_Status_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Invalid_Status_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "invalid_status" }, output={ "errors": [ { "errorCode": "PMS_MSP_433" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that deactivating a MISP partner license fails when an invalid license status is provided, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateMISPPartnerLicenseNegTC_with_Invalid_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Invalid_Token_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "invalid_license_key_name", "status": "De-Activate" }, output={ "errors": [ { "errorCode": "PMS_MSP_427" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that deactivating a MISP partner license fails when an invalid authentication token is provided, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateMISPPartnerLicenseNegTC_with_Invalid_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_with_Invalid_Version_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "invalid_version", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "De-Activate" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that deactivating a MISP partner license fails when an invalid or incorrect version is provided, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateMISPPartnerLicenseNegTC_without_Access_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_without_Access_Token_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_policyId$", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "De-Activate" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that deactivating a MISP partner license fails when no access token is provided, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateMISPPartnerLicenseNegTC_without_PartnerId_Field_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateMISPPartnerLicenseNegTC_without_PartnerId_Field_Neg, endPoint=/v1/partnermanager/misp-licenses/{partnerId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.deactivate.misp.license.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyId": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_partnerId$", "licenseKeyName": "$ID:RegenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "status": "De-Activate" }, output={ "responseCode": "404" }, inputTemplate=pms/MispLicenseV3/DeactivateMISPPartnerLicense/DeactivateMISPPartnerLicense, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that deactivating a MISP partner license fails when the partner ID field is missing from the request, uniqueIdentifier=TC_PMS_DeactivateMISPPartnerLicenseNegTC_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateDevice_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateDevice_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProviderForDeactivate_AllValid_Smoke_sid_id$", "status": "De-Activate" }, output={ }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/DeactivateDevice/DeactivateDeviceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a device is successfully deactivated when all input parameters are valid, uniqueIdentifier=TC_PMS_DeactivateDevice_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateDevice_Already_deactivated_device_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateDevice_Already_deactivated_device_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProviderForDeactivate_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_014" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device deactivation fails when the device is already deactivated, uniqueIdentifier=TC_PMS_DeactivateDevice_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateDevice_Empty_requestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateDevice_Empty_requestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$REMOVE$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device deactivation fails when the request time is empty, uniqueIdentifier=TC_PMS_DeactivateDevice_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateDevice_Missing_requestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateDevice_Missing_requestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device deactivation fails when the request time is missing, uniqueIdentifier=TC_PMS_DeactivateDevice_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateDevice_with_Empty_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateDevice_with_Empty_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.device.patch", "version": "$REMOVE$", "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDeviceNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device deactivation fails when the version value is empty, uniqueIdentifier=TC_PMS_DeactivateDevice_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateDevice_with_Invalid_Device_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateDevice_with_Invalid_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "APPLE1111222" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device deactivation fails when an invalid device ID is provided, uniqueIdentifier=TC_PMS_DeactivateDevice_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateDevice_with_Invalid_RandomDevice_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateDevice_with_Invalid_RandomDevice_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "00001111222" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device deactivation fails when a random or non-existent device ID is provided, uniqueIdentifier=TC_PMS_DeactivateDevice_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateDevice_with_Invalid_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateDevice_with_Invalid_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.device.patch", "version": "99", "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDeviceNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device deactivation fails when an invalid version is provided, uniqueIdentifier=TC_PMS_DeactivateDevice_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateDevice_with_Invalid_requestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateDevice_with_Invalid_requestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "1111-07-22T08:21:17.665Z", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device deactivation fails when the request time is invalid, uniqueIdentifier=TC_PMS_DeactivateDevice_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateDevice_without_authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateDevice_without_authentication_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=invalidtoken, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device deactivation fails when authentication is not provided, uniqueIdentifier=TC_PMS_DeactivateDevice_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_all_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_all_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI is successfully deactivated even when it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Already_deactivated_SBI_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Already_deactivated_SBI_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_020" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when the SBI is already deactivated even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Empty_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Empty_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when the SBI ID is empty even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Empty_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Empty_Version_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when the version is empty even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Empty_requestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Empty_requestTime_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when the request time is empty even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_InvalidNumeric_SBI_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_InvalidNumeric_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "0101022" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when the SBI ID contains an invalid numeric value even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Invalid_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "JSKSKA56888", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when an invalid SBI ID is provided even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Invalid_SBI_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "APPLEMANCAP" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when an invalid SBI ID is provided even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue0_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue0_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when the version value is 0 even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue1_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when an invalid version value is provided even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "9977", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when an invalid version value is provided even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Invalid_requestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_requestTime_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "1111-07-22T08:21:17.665Z", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when an invalid request time is provided even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Keeping_IDas_Null_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Keeping_IDas_Null_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "Null", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when the SBI ID is provided as null even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Missing_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Missing_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when the SBI ID is missing even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Missing_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Missing_Version_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "$REMOVE$", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when the version is missing even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Missing_requestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Missing_requestTime_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$REMOVE$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when the request time is missing even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Null_SBI_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Null_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "Null" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when the SBI ID is null, even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Null_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Null_Version_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "Null", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when the version is null even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Space_SBI_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Space_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": " " }, output={ "responseCode": "400" }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when the SBI ID contains only spaces even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_Without_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Without_Authentication_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=invalidtoken, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when authentication is not provided even if it has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateSBIWithAssociatedDevices_with_invalid_roles_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_with_invalid_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=device, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that SBI deactivation fails when attempted by a user with invalid roles even if the SBI has associated devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_ApproveMappingDeviceToSbi_whenSBIisDeactivated_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PostWithBodyAndPathParams |
| Testcase Input |
| testCaseName=Pms_ApproveMappingDeviceToSbi_whenSBIisDeactivated_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_029" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that device mapping to an SBI fails when the SBI is deactivated, uniqueIdentifier=TC_PMS_ApproveMappingDevice_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_all_Valid_Smoke_sid |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "status": "approved", "isActive": true }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/DeactivateFtm/DeactivateFtmResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that an FTM device is successfully deactivated when all input parameters are valid, uniqueIdentifier=TC_PMS_DeactivateFtm_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Already_Deactivate_FTM_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Already_Deactivate_FTM_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_007" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating the FTM which is already Deactivated and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Empty_FTM_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Empty_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "" }, output={ "responseCode": "404" }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Empty and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Empty_Req_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Empty_Req_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM keeping ID parameter as Empty in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Empty_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Empty_Version_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as Empty in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Empty_requestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Empty_requestTime_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping requestTime parameter as Empty in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Invalid_Values_FTM_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Invalid_Values_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "Apple0192938838" }, output={ "errors": [ { "errorCode": "PMS_PRT_099" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Invalid values and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Invalid_VersionValue0_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Invalid_VersionValue0_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as invalid value 0 in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Invalid_VersionValue1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Invalid_VersionValue1_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as invalid value 1 in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Invalid_Version_Num_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Invalid_Version_Num_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "9977", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as invalid values in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Invalid_requestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Invalid_requestTime_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "1111-07-22T08:21:17.665Z", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Request Time parameter as invalid in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Keeping_Req_IDas_Null_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Keeping_Req_IDas_Null_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "Null", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping requestID parameter as Null in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Missing_Req_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Missing_Req_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM with the requestID parameter missing in the request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Missing_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Missing_Version_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as Missing in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Missing_requestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Missing_requestTime_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$REMOVE$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping requestTime parameter as Missing in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Null_FTM_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Null_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "Null" }, output={ "errors": [ { "errorCode": "PMS_PRT_099" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Null and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_Null_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_Null_Version_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "Null", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as Null in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_with_SpaceValue_FTM_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_with_SpaceValue_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": " " }, output={ "responseCode": "400" }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Missing and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivateFtm_without_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivateFtm_without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=invalidtoken, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that FTM device deactivation fails when authentication is not provided, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetOriginalFtmCertifacte_AfterDeactiveFtm_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetOriginalFtmCertifacte_AfterDeactiveFtm_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_009", "message": "Cannot download the certificate for a deactivated FTM" } ] }, inputTemplate=pms/GetOriginalFtmCertifacteAfterDeactiveFtm/GetOriginalFtmCertifacteAfterDeactiveFtm, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify that the API fails to retrieve FTM certificates after the FTM has been deactivated, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteAfterDeactiveFtm_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicy_After_Publish_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicy_After_Publish_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output= { }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/DeactivatePolicy/DeactivatePolicyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a published policy is successfully deactivated with all valid inputs, uniqueIdentifier=TC_PMS_deactivate_policy_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicy_WithRejectedPolicy_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicy_WithRejectedPolicy_Neg, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_For_Reject_Policy_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output= { }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/DeactivatePolicy/DeactivatePolicyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy deactivation fails when the policy is in rejected status, uniqueIdentifier=TC_PMS_deactivate_policy_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicy_already_deactivated |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicy_already_deactivated, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_062" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy deactivation fails when the policy is already deactivated, uniqueIdentifier=TC_PMS_deactivate_policy_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicy_invalid_policyId |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicy_invalid_policyId, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "hhggtt567", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_065" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy deactivation fails when an invalid policy ID is provided, uniqueIdentifier=TC_PMS_deactivate_policy_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicy_invalid_policyId_spaces |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicy_invalid_policyId_spaces, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": " ", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "responseCode": "400" }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that policy deactivation fails when the policy ID contains spaces, uniqueIdentifier=TC_PMS_deactivate_policy_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicy_invalid_roles |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicy_invalid_roles, endPoint=/v1/policymanager/policies/{policyId}, role=POLICYMANAGER, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy deactivation fails when attempted by a user with invalid roles, uniqueIdentifier=TC_PMS_deactivate_policy_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicy_with_DraftPolicy_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicy_with_DraftPolicy_Neg, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_For_Draft_Policy_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_072" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy deactivation fails when the policy is in draft status, uniqueIdentifier=TC_PMS_deactivate_policy_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicy_with_InProgressPolicy_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicy_with_InProgressPolicy_Neg, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_For_InProgressMapping_Policy_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_064" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy deactivation fails when the policy is in progress, uniqueIdentifier=TC_PMS_deactivate_policy_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicy_with_approved_policyrequests |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicy_with_approved_policyrequests, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_063" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy deactivation fails when there are approved policy requests associated with it, uniqueIdentifier=TC_PMS_deactivate_policy_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicy_without_authentication |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicy_without_authentication, endPoint=/v1/policymanager/policies/{policyId}, role=invalidtoken, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy deactivation fails when authentication is not provided, uniqueIdentifier=TC_PMS_deactivate_policy_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicy_without_id |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicy_without_id, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "$REMOVE$", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy deactivation fails when the policy ID is not provided, uniqueIdentifier=TC_PMS_deactivate_policy_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicy_without_requestime |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicy_without_requestime, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$REMOVE$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy deactivation fails when the request time is not provided, uniqueIdentifier=TC_PMS_deactivate_policy_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicy_without_version |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicy_without_version, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy deactivation fails when the policy version is not provided, uniqueIdentifier=TC_PMS_deactivate_policy_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_All_Valid_Smoke, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output= { "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$", "isActive": false }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroupResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that a policy group is successfully deactivated when all inputs are valid, uniqueIdentifier=TC_PMS_deactivate_policy_group_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_future_date_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_future_date_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "2026-01-24T07:47:57.206Z", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation fails when a future date is provided in the request, uniqueIdentifier=TC_PMS_deactivate_policy_group_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_invalid_id_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_invalid_id_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.deactiavte", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation fails when an invalid policy group ID is provided, uniqueIdentifier=TC_PMS_deactivate_policy_group_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_invalid_policygroupid_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_invalid_policygroupid_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "6776654" }, output={ "errors": [ { "errorCode": "PMS_POL_068" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation fails when an invalid policy group ID is provided, uniqueIdentifier=TC_PMS_deactivate_policy_group_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_invalid_roles_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_invalid_roles_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=POLICYMANAGER, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation fails when attempted by a user with invalid roles, uniqueIdentifier=TC_PMS_deactivate_policy_group_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_invalid_status_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_invalid_status_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_073" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation fails when an invalid status is provided, uniqueIdentifier=TC_PMS_deactivate_policy_group_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_invalid_version_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_invalid_version_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "2.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation fails when an invalid version is provided, uniqueIdentifier=TC_PMS_deactivate_policy_group_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_past_date_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_past_date_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "2024-01-24T07:47:57.206Z", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation fails when a past date is provided in the request, uniqueIdentifier=TC_PMS_deactivate_policy_group_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_spacevalue_policygroupid_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_spacevalue_policygroupid_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": " " }, output={ "responseCode": "400" }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation fails when the policy group ID contains only spaces, uniqueIdentifier=TC_PMS_deactivate_policy_group_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_with_Draftpolicy_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_with_Draftpolicy_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_ForDraftPolicy_pms_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_070" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation fails when it contains draft policies, uniqueIdentifier=TC_PMS_deactivate_policy_group_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_with_deactivated_policies |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_with_deactivated_policies, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_ForDeactivatePolicy_pms_sid_id$" }, output={ "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_ForDeactivatePolicy_pms_sid_id$", "isActive": false }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroupResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation succeeds even when it contains already deactivated policies, uniqueIdentifier=TC_PMS_deactivate_policy_group_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_with_publishpolicy_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_with_publishpolicy_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_056" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation fails when it contains published policies, uniqueIdentifier=TC_PMS_deactivate_policy_group_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_without_authentication_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_without_authentication_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=invalidtoken, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation fails when authentication is not provided, uniqueIdentifier=TC_PMS_deactivate_policy_group_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_without_id_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_without_id_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation fails when the policy group ID is not provided, uniqueIdentifier=TC_PMS_deactivate_policy_group_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_without_requesttime_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_without_requesttime_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$REMOVE$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation fails when the request time is not provided, uniqueIdentifier=TC_PMS_deactivate_policy_group_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_without_status_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_without_status_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "$REMOVE$", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_073" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation fails when the status is not provided, uniqueIdentifier=TC_PMS_deactivate_policy_group_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DeactivatePolicyGroup_without_version_neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DeactivatePolicyGroup_without_version_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that policy group deactivation fails when the version is not provided, uniqueIdentifier=TC_PMS_deactivate_policy_group_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| PMS_GetAllNotifications_UsingPartnerToken_FilteredByNotificationTypeRoot_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=PMS_GetAllNotifications_UsingPartnerToken_FilteredByNotificationTypeRoot_Neg, endPoint=/v1/partnermanager/notifications?notificationType=root&pageNo=0&pageSize=4, role=partnerftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_006" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications using a partner token fails when filtered by a notificationTypeRoot that the partner is not authorized to access, uniqueIdentifier=TC_PMS_GetAllNotifications_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| PMS_GetAllNotifications_by_filtering_CertificateID_without_selecting_NotificatioType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=PMS_GetAllNotifications_by_filtering_CertificateID_without_selecting_NotificatioType_Neg, endPoint=/v1/partnermanager/notifications?pageNo=0&certificateId=fd0e8be0-9499-448e-9b85-06d5649c3f0e, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when filtering by certificateID is attempted without selecting a notificationType, uniqueIdentifier=TC_PMS_GetAllNotifications_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_All_Valid_Smoke, endPoint=/v1/partnermanager/notifications, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all notifications are successfully retrieved with valid inputs, uniqueIdentifier=TC_PMS_GetAllNotifications_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Different_Time_Format_Created_From_Date |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Different_Time_Format_Created_From_Date, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4&createdFromDate=07-04-2025, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_025" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when the createdFromDate is provided in an unsupported or incorrect date/time format, uniqueIdentifier=TC_PMS_GetAllNotifications_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Different_Time_Format_Created_To_Date |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Different_Time_Format_Created_To_Date, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4&createdToDate=07-04-2025, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_026" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when the createdToDate is provided in an unsupported or incorrect date/time format, uniqueIdentifier=TC_PMS_GetAllNotifications_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Different_Time_Format_Expiry_Date |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Different_Time_Format_Expiry_Date, endPoint=/v1/partnermanager/notifications?pageSize=16&expiryDate=07-04-2025, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_016" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when the expiryDate is provided in an unsupported or incorrect date/time format, uniqueIdentifier=TC_PMS_GetAllNotifications_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_ApiKey_Invalid_ftmChipType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_ApiKey_Invalid_ftmChipType_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&apiKeyName=12, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_020" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an invalid ftmChipType is provided while filtering by apiKey, uniqueIdentifier=TC_PMS_GetAllNotifications_38, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_Invalid_NotificationType_invalid_partnerDomain_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_Invalid_NotificationType_invalid_partnerDomain_Neg, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip&partnerDomain=AUTH, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_021" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an invalid notificationType or partnerDomain is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_41, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_PageNo_2_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_PageNo_2_Neg, endPoint=/v1/partnermanager/notifications?pageSize=2, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsPageNoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an invalid page number is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_35, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_Page_Size4_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_Page_Size4_Neg, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when an invalid page size 4 is provided in the filter, uniqueIdentifier=TC_PMS_GetAllNotifications_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_Page_Size8_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_Page_Size8_Neg, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when an invalid page size 8 is provided in the filter, uniqueIdentifier=TC_PMS_GetAllNotifications_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_Root_Certificates_Notifications |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_Root_Certificates_Notifications, endPoint=/v1/partnermanager/notifications?notificationType=root&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the Get All Notifications API correctly retrieves notifications related to root certificates when filtered by the appropriate notificationType, uniqueIdentifier=null, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_SbiID_without_notificationType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_SbiID_without_notificationType_Neg, endPoint=/v1/partnermanager/notifications?sbiId=PMS-SBI, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when filtering by sbiId without selecting a notificationType, uniqueIdentifier=TC_PMS_GetAllNotifications_32, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_Status_Active_Notifications |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_Status_Active_Notifications, endPoint=/v1/partnermanager/notifications?notificationStatus=active&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the Get All Notifications API correctly retrieves notifications that are currently active when filtered by status active, uniqueIdentifier=TC_PMS_GetAllNotifications_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_Status_Dismissed_Notifications |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_Status_Dismissed_Notifications, endPoint=/v1/partnermanager/notifications?notificationStatus=dismissed&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the Get All Notifications API correctly retrieves notifications that are dismissed when filtered by status dismissed, uniqueIdentifier=TC_PMS_GetAllNotifications_20, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_Weekly_Notifications |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_Weekly_Notifications, endPoint=/v1/partnermanager/notifications?notificationType=weekly&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the Get All Notifications API correctly retrieves notifications filtered for the current week returning only notifications issued within the last 7 days, uniqueIdentifier=TC_PMS_GetAllNotifications_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_ftmChip_Invalid_apikeyType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_ftmChip_Invalid_apikeyType_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&ftmId=12, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_022" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an invalid apiKeyType is provided while filtering by ftmChip, uniqueIdentifier=TC_PMS_GetAllNotifications_39, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_ftmChip_without_notificationType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_ftmChip_without_notificationType_Neg, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4&ftmId=ftm-1212&make=ftm-1212&model=ftm-1212, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when filtering by ftmChip without selecting a notificationType, uniqueIdentifier=TC_PMS_GetAllNotifications_30, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_invalid_PageNo_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_invalid_PageNo_Neg, endPoint=/v1/partnermanager/notifications?pageNo=-4, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an invalid or non-numeric page number is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_36, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_invalid_PageSize_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_invalid_PageSize_Neg, endPoint=/v1/partnermanager/notifications?pageSize=-22, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an invalid or non-numeric page size is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_37, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_invalid_SbiID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_invalid_SbiID_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsTotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an invalid sbiId is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_31, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_invalid_SbiVersionValues_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_invalid_SbiVersionValues_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI&sbiVersion=_%2ASBI, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when invalid sbiVersion values are provided, uniqueIdentifier=TC_PMS_GetAllNotifications_34, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_invalid_SbiVersion_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_invalid_SbiVersion_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI&sbiVersion=ab-102-13881, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsTotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an invalid sbiVersion is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_33, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_invalid_ftmId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_invalid_ftmId_Neg, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip&ftmId=342342, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsTotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an invalid ftmId is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_28, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_invalid_make_model_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_invalid_make_model_Neg, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip&pageNo=0&pageSize=4&ftmId=ftm-1212&make=ftm-1212&model=ftm-1212, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsTotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an invalid make or model is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_29, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_invalid_policyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_invalid_policyName_Neg, endPoint=/v1/partnermanager/notifications?policyName=PMS-test, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an invalid policyName is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_27, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_policyName_invalid_notificationType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_policyName_invalid_notificationType_Neg, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip&policyName=PMS-test, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_028" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when policyName is filtered with an invalid notificationType, uniqueIdentifier=TC_PMS_GetAllNotifications_26, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_policyName_without_notificationType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_policyName_without_notificationType_Neg, endPoint=/v1/partnermanager/notifications?policyName=PMS-test, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when policyName is filtered without notificationType, uniqueIdentifier=TC_PMS_GetAllNotifications_25, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Filter_sbiId_Invalid_ftmChip_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Filter_sbiId_Invalid_ftmChip_Neg, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip&sbiId=12, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_023" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an invalid ftmChip is provided while filtering by sbiId, uniqueIdentifier=TC_PMS_GetAllNotifications_40, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_For_IntermediateType_Notifications |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_For_IntermediateType_Notifications, endPoint=/v1/partnermanager/notifications?notificationType=intermediate&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when requesting notifications for IntermediateType without proper filters or permissions, uniqueIdentifier=TC_PMS_GetAllNotifications_22, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_For_RootType_Notifications |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_For_RootType_Notifications, endPoint=/v1/partnermanager/notifications?notificationType=root&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when requesting notifications for RootType without proper filters, uniqueIdentifier=TC_PMS_GetAllNotifications_21, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_For_WeeklyType_Notifications |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_For_WeeklyType_Notifications, endPoint=/v1/partnermanager/notifications?notificationType=weekly&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when requesting notifications for WeeklyType without proper filters, uniqueIdentifier=TC_PMS_GetAllNotifications_23, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Invalid_Certificate_ID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Invalid_Certificate_ID_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&certificateId=777apple@%123, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an invalid certificateID is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_49, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Invalid_Certificate_ID_Without_NotificationType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Invalid_Certificate_ID_Without_NotificationType_Neg, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=8&certificateId=777apple123, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when an invalid certificate ID is provided without specifying the notification type, uniqueIdentifier=TC_PMS_GetAllNotifications_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Invalid_Created_From_Date |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Invalid_Created_From_Date, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4&createdFromDate=123456, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_025" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when an invalid created-from date is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Invalid_Created_To_Date |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Invalid_Created_To_Date, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4&createdToDate=928382, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_026" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when an invalid createdToDate value is provided in the request, uniqueIdentifier=TC_PMS_GetAllNotifications_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_Invalid_Expiry_Date |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_Invalid_Expiry_Date, endPoint=/v1/partnermanager/notifications?pageSize=16&expiryDate=881718821, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_016" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when an invalid expiryDate value is provided in the request, uniqueIdentifier=TC_PMS_GetAllNotifications_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_by_filtering_IssuedBy_without_selecting_NotificatioType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_by_filtering_IssuedBy_without_selecting_NotificatioType_Neg, endPoint=/v1/partnermanager/notifications?pageSize=16&issuedBy=mosip, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when filtering by issuedBy is attempted without selecting a notificationType, uniqueIdentifier=TC_PMS_GetAllNotifications_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_by_filtering_IssuedTo_without_selecting_NotificatioType_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_by_filtering_IssuedTo_without_selecting_NotificatioType_Neg, endPoint=/v1/partnermanager/notifications?pageSize=4&issuedTo=mosip, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when filtering by issuedTo is attempted without selecting a notificationType, uniqueIdentifier=TC_PMS_GetAllNotifications_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_invalid_apiKeyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_invalid_apiKeyName_Neg, endPoint=/v1/partnermanager/notifications?notificationType=apikey&apiKeyName=%2APMS121, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when an invalid apiKeyName is provided in the request, uniqueIdentifier=TC_PMS_GetAllNotifications_24, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_Apikey_NotificationType |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_Apikey_NotificationType, endPoint=/v1/partnermanager/notifications?notificationType=apikey, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an unsupported API Key notification type is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_48, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_Apikey_NotificationType_And_CertificateId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_Apikey_NotificationType_And_CertificateId_Neg, endPoint=/v1/partnermanager/notifications, role=partneradmin, templateFields=null, input={ "apiKeyName": "$REMOVE$", "certificateId": "$ID:UploadPartnerCert_All_Valid_Smoke_Sid_certificateId$", "createdFromDate": "$REMOVE$", "createdToDate": "$REMOVE$", "expiryDate": "$REMOVE$", "mispPartnerId": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "notificationType": "apikey" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_021" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotificationsInput, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when filtering by API Key notification type along with an invalid certificateID, uniqueIdentifier=TC_PMS_GetAllNotifications_50, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_Apikey_NotificationType_And_LicenseKeyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_Apikey_NotificationType_And_LicenseKeyName_Neg, endPoint=/v1/partnermanager/notifications, role=partneradmin, templateFields=null, input={ "apiKeyName": "$REMOVE$", "certificateId": "$REMOVE$", "createdFromDate": "$REMOVE$", "createdToDate": "$REMOVE$", "expiryDate": "$REMOVE$", "mispPartnerId": "$REMOVE$", "mispLicenseKeyName": "$ID:GenerateMISPPartnerLicense_All_Valid_Smoke_sid_licenseKeyName$", "notificationType": "apikey" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_027" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotificationsInput, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when filtering by API Key notification type with an invalid licenseKeyName, uniqueIdentifier=TC_PMS_GetAllNotifications_53, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_Apikey_NotificationType_And_apiKeyName |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_Apikey_NotificationType_And_apiKeyName, endPoint=/v1/partnermanager/notifications, role=partneradmin, templateFields=null, input={ "apiKeyName": "$ID:GenerateApiKey_AllValid_smoke_sid_label$", "certificateId": "$REMOVE$", "createdFromDate": "$REMOVE$", "createdToDate": "$REMOVE$", "expiryDate": "$REMOVE$", "mispPartnerId": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "notificationType": "apikey" }, output={ }, inputTemplate=pms/GetAllNotifications/GetAllNotificationsInput, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when filtering by API Key notification type with an invalid apiKeyName, uniqueIdentifier=TC_PMS_GetAllNotifications_54, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_Ftm-chip_NotificationType |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_Ftm-chip_NotificationType, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an unsupported FTM-Chip notification type is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_47, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_Invalid_Access_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_Invalid_Access_Token_Neg, endPoint=/v1/partnermanager/notifications, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an invalid access token is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_42, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_Invalid_QueryParams_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_Invalid_QueryParams_Neg, endPoint=/v1/partnermanager/notifications?mispPartnerId=pms@%111555, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when invalid query parameters are provided, uniqueIdentifier=TC_PMS_GetAllNotifications_43, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_MISP_NotificationType |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_MISP_NotificationType, endPoint=/v1/partnermanager/notifications?notificationType=misp, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an unsupported MISP notification type is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_44, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_None_NotificationType_And_CertificateId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_None_NotificationType_And_CertificateId_Neg, endPoint=/v1/partnermanager/notifications, role=partneradmin, templateFields=null, input={ "apiKeyName": "$REMOVE$", "certificateId": "$ID:UploadPartnerCert_All_Valid_Smoke_Sid_certificateId$", "createdFromDate": "$REMOVE$", "createdToDate": "$REMOVE$", "expiryDate": "$REMOVE$", "mispPartnerId": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "notificationType": "none" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_021" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotificationsInput, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when filtering with no notificationType and an invalid certificateID, uniqueIdentifier=TC_PMS_GetAllNotifications_51, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_Partner_NotificationType |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_Partner_NotificationType, endPoint=/v1/partnermanager/notifications?notificationType=partner, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an unsupported Partner notification type is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_45, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_Partner_NotificationType_And_MispPartnerId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_Partner_NotificationType_And_MispPartnerId_Neg, endPoint=/v1/partnermanager/notifications, role=partneradmin, templateFields=null, input={ "apiKeyName": "$REMOVE$", "certificateId": "$REMOVE$", "createdFromDate": "$REMOVE$", "createdToDate": "$REMOVE$", "expiryDate": "$REMOVE$", "mispPartnerId": "$ID:MISPPartnerRegistration_All_Valid_Smoke_reqsid_Sid_partnerId$", "mispLicenseKeyName": "$REMOVE$", "notificationType": "partner" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_027" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotificationsInput, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when filtering by Partner notification type with an invalid MISP Partner ID, uniqueIdentifier=TC_PMS_GetAllNotifications_52, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_Partner_NotificationType_And_apiKeyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_Partner_NotificationType_And_apiKeyName_Neg, endPoint=/v1/partnermanager/notifications, role=partneradmin, templateFields=null, input={ "apiKeyName": "$ID:GenerateApiKey_AllValid_smoke_sid_label$", "certificateId": "$REMOVE$", "createdFromDate": "$REMOVE$", "createdToDate": "$REMOVE$", "expiryDate": "$REMOVE$", "mispPartnerId": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "notificationType": "partner" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_020" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotificationsInput, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when filtering by Partner notification type with an invalid apiKeyName, uniqueIdentifier=TC_PMS_GetAllNotifications_56, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_Partner_NotificationType_And_createdToDate_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_Partner_NotificationType_And_createdToDate_Neg, endPoint=/v1/partnermanager/notifications, role=partneradmin, templateFields=null, input={ "apiKeyName": "$REMOVE$", "certificateId": "$REMOVE$", "createdFromDate": "$REMOVE$", "createdToDate": "$ID:GetListOfAllSBI_Filter_Expiry_Period_30_days_Sid_sbiExpiryDateTime$", "expiryDate": "$REMOVE$", "mispPartnerId": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "notificationType": "partner" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_017" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotificationsInput, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when filtering by Partner notification type with an invalid createdToDate, uniqueIdentifier=TC_PMS_GetAllNotifications_59, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_Root_NotificationType_And_apiKeyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_Root_NotificationType_And_apiKeyName_Neg, endPoint=/v1/partnermanager/notifications, role=partneradmin, templateFields=null, input={ "apiKeyName": "$ID:GenerateApiKey_AllValid_smoke_sid_label$", "certificateId": "$REMOVE$", "createdFromDate": "$REMOVE$", "createdToDate": "$REMOVE$", "expiryDate": "$REMOVE$", "mispPartnerId": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "notificationType": "root" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_020" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotificationsInput, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when filtering by Root notification type with an invalid apiKeyName, uniqueIdentifier=TC_PMS_GetAllNotifications_55, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_Sbi_NotificationType |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_Sbi_NotificationType, endPoint=/v1/partnermanager/notifications?notificationType=sbi, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when an unsupported SBI notification type is provided, uniqueIdentifier=TC_PMS_GetAllNotifications_46, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_Sbi_NotificationType_And_ExpiryDate |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_Sbi_NotificationType_And_ExpiryDate, endPoint=/v1/partnermanager/notifications, role=partneradmin, templateFields=null, input={ "apiKeyName": "$REMOVE$", "certificateId": "$REMOVE$", "createdFromDate": "$REMOVE$", "createdToDate": "$REMOVE$", "expiryDate": "$ID:GetListOfAllSBI_Filter_Expiry_Period_30_days_Sid_sbiExpiryDateTime$", "mispPartnerId": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "notificationType": "sbi" }, output={ }, inputTemplate=pms/GetAllNotifications/GetAllNotificationsInput, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when filtering by SBI notification type with an invalid expiryDate, uniqueIdentifier=TC_PMS_GetAllNotifications_57, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_with_Weekly_NotificationType_And_createdFromDate_And_createdToDate |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_with_Weekly_NotificationType_And_createdFromDate_And_createdToDate, endPoint=/v1/partnermanager/notifications, role=partneradmin, templateFields=null, input={ "apiKeyName": "$REMOVE$", "certificateId": "$REMOVE$", "createdFromDate": "$ID:GetListOfAllSBI_Filter_Expiry_Period_30_days_Sid_sbiCreatedDateTime$", "createdToDate": "$ID:GetListOfAllSBI_Filter_Expiry_Period_30_days_Sid_sbiExpiryDateTime$", "expiryDate": "$REMOVE$", "mispPartnerId": "$REMOVE$", "mispLicenseKeyName": "$REMOVE$", "notificationType": "weekly" }, output={ }, inputTemplate=pms/GetAllNotifications/GetAllNotificationsInput, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that notifications retrieval fails when filtering by Weekly notification type with invalid createdFromDate or createdToDate, uniqueIdentifier=TC_PMS_GetAllNotifications_58, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_without_Authorization_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_without_Authorization_Token_Neg, endPoint=/v1/partnermanager/notifications, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when the request is made without providing a valid authorization token, uniqueIdentifier=TC_PMS_GetAllNotifications_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllNotifications_without_Partner_Admin_Role_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithQueryParam |
| Testcase Input |
| testCaseName=Pms_GetAllNotifications_without_Partner_Admin_Role_Neg, endPoint=/v1/partnermanager/notifications, role=auth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving notifications fails when the request is made by a user who does not have the Partner Admin role, uniqueIdentifier=TC_PMS_GetAllNotifications_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Empty_Notification_Status_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Empty_Notification_Status_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": notificationId, "notificationStatus": "" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_012" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when the notification status is empty, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Empty_RequestID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Empty_RequestID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when the request ID is empty, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Empty_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1", "requesttime": "", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when the requestTime is empty, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Invalid_NotificationID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Invalid_NotificationID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": "fd0e8", "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_008" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when an invalid notification ID is provided, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Invalid_Notification_Status_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Invalid_Notification_Status_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": notificationId, "notificationStatus": "CANCEL" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_012" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when the notification status is invalid, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Invalid_Param_Dismiss_Notification_Status_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Invalid_Param_Dismiss_Notification_Status_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": notificationId, "notificationStatus": "DISMISS" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_012" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when an invalid parameter is provided for dismissNotificationStatus, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Invalid_RequestID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Invalid_RequestID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when an invalid request ID is provided, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Invalid_Value_0_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Invalid_Value_0_Version_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when the version value is invalid set to 0, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Invalid_Value_1_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Invalid_Value_1_Version_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when the version value is invalid set to 1, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Invalid_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Invalid_Version_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "12345", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when an invalid version is provided, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Null_NotificationID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Null_NotificationID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": "NULL", "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_008" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when the notification ID is null, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Null_RequestID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Null_RequestID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when the request ID is null, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Null_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Null_Version_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "Null", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when the version is null, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Without_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Without_Authentication_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": "fd0e8be0-9499-448e-9b85-06d5649c3f0e", "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when authentication is not provided, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Without_RequestID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Without_RequestID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when the request ID is not provided, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_Without_Version_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_Without_Version_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when the version is not provided, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_without_Object_Parameter_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_without_Object_Parameter_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": notificationId, "notificationStatus": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_019" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when the object parameter is not provided, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_without_PartnerAdmin_Role_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_without_PartnerAdmin_Role_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=auth, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when the user does not have the Partner Admin role, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_DismissNotification_without_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PatchWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_DismissNotification_without_RequestTime_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that dismissing a notification fails when the requestTime is not provided, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_All_Valid_Smoke, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "$RUNCONTEXT$pms-111777" }, output={ }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestampResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp with all valid inputs is successful and the changes are reflected correctly, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestamp_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_Empty_RequestId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Empty_RequestId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "$RUNCONTEXT$pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when the requestId parameter is empty, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_Empty_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": " ", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "$RUNCONTEXT$pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when the requestTime parameter is empty, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_Empty_notificationsSeenDtimes_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Empty_notificationsSeenDtimes_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": " ", "userId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when notificationsSeenDtimes is empty, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_Invalid_Partner_Admin_Role_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Invalid_Partner_Admin_Role_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=auth, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "$RUNCONTEXT$pms-111777" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when performed by a user with an invalid Partner Admin role, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_17, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_Invalid_RequestId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Invalid_RequestId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "$RUNCONTEXT$pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when an invalid requestId is provided, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_Invalid_Version_Value_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Invalid_Version_Value_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1010", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "$RUNCONTEXT$pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when an invalid version parameter value is provided, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_Invalid_userId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Invalid_userId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "base-admin" }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when an invalid userId is provided, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_Invalid_userId_With_PartnerAdminRole_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Invalid_userId_With_PartnerAdminRole_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "base-admin" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when an invalid userId is provided even with Partner Admin role, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_19, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_Null_RequestId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Null_RequestId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "Null", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "$RUNCONTEXT$pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when the requestId parameter is null, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_Null_Version_Value_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Null_Version_Value_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "Null", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "$RUNCONTEXT$pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when the version parameter value is null, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_Null_userId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Null_userId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partnerauth, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "Null" }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when the userId is null, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_Version_Value0_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Version_Value0_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "$RUNCONTEXT$pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when version is set to an invalid value 0, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_Version_Value1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Version_Value1_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "$RUNCONTEXT$pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when version is set to an unsupported value -1, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_Without_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Without_Authentication_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "$RUNCONTEXT$pms-111777" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when authentication is not provided, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_Without_Version_Value_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Without_Version_Value_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "$RUNCONTEXT$pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when the version parameter value is missing, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_with_Partner_Role_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_with_Partner_Role_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "$RUNCONTEXT$pms-111777" }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when performed by a user with Partner role, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_18, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_without_Object_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_without_Object_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "$REMOVE$", "userId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when the request object is missing, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_without_RequestId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_without_RequestId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "$RUNCONTEXT$pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when the requestId parameter is missing, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_UpdateNotificationSeenTimestamp_without_RequestTime_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| PutWithPathParamsAndBody |
| Testcase Input |
| testCaseName=Pms_UpdateNotificationSeenTimestamp_without_RequestTime_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that updating the Notification Seen Timestamp fails when the requestTime parameter is missing, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetNotificationsSeenTimestamp_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetNotificationsSeenTimestamp_All_Valid_Smoke, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "userId": "$ID:PartnerSelfRegistration_All_Valid_Smoke_sid_partnerId$" }, output= { }, inputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestamp, outputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestampResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API successfully retrieves the seen timestamps for all notifications with valid inputs, uniqueIdentifier=TC_PMS_GetNotificationsSeenTimestamp_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetNotificationsSeenTimestampNegativeScenarios_Invalid_userId_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetNotificationsSeenTimestampNegativeScenarios_Invalid_userId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partnerauth, templateFields=null, input={ "userId": "base-admin" }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestamp, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails to retrieve notification timestamps when an invalid userId is provided, uniqueIdentifier=TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetNotificationsSeenTimestampNegativeScenarios_Invalid_userId_PartnerAdminRole_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetNotificationsSeenTimestampNegativeScenarios_Invalid_userId_PartnerAdminRole_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "userId": "base-admin" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_003" } ] }, inputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestamp, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails to retrieve notification timestamps when an invalid userId is provided even with a Partner Admin role, uniqueIdentifier=TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetNotificationsSeenTimestampNegativeScenarios_with_InvalidToken_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetNotificationsSeenTimestampNegativeScenarios_with_InvalidToken_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=invalidtoken, templateFields=null, input={ "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestamp, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails to retrieve notification timestamps when an invalid or expired token is used, uniqueIdentifier=TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetNotificationsSeenTimestampNegativeScenarios_without_AdminRole_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetNotificationsSeenTimestampNegativeScenarios_without_AdminRole_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=auth, templateFields=null, input={ "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestamp, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that the API fails to retrieve notification timestamps when accessed without an admin role, uniqueIdentifier=TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerExpiringCertificate_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerExpiringCertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ "expiryPeriod": "30" }, output={ "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all partner certificates nearing expiry are retrieved successfully for a valid request, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificate_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerExpiringCertificate_Expiry_Date_10_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerExpiringCertificate_Expiry_Date_10_Smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ "expiryPeriod": "10" }, output={ "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner certificates expiring exactly 10 days from today are retrieved successfully, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificate_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerExpiringCertificate_Expiry_Date_15_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerExpiringCertificate_Expiry_Date_15_Smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ "expiryPeriod": "15" }, output={ "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner certificates expiring exactly 15 days from today are retrieved successfully, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificate_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerExpiringCertificate_Expiry_Days_30_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerExpiringCertificate_Expiry_Days_30_Smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ "expiryPeriod": "30" }, output={ "partnerId": "$ID:PartnerSelfRegistration_Device_provider_All_Valid_Smoke_sid_partnerId$", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that partner certificates expiring within the next 30 days are retrieved successfully, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificate_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerExpiringCertificateNegativeScenarios_Invalid_Role_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerExpiringCertificateNegativeScenarios_Invalid_Role_Neg, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=device, templateFields=null, input={ "expiryPeriod": "30" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving expiring partner certificates fails when the user has an invalid role, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerExpiringCertificateNegativeScenarios_Invalid_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerExpiringCertificateNegativeScenarios_Invalid_Token_Neg, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=invalidtoken, templateFields=null, input={ "expiryPeriod": "30" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving expiring partner certificates fails when an invalid token is used, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetRootIntermediateExpiringCertificate_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetRootIntermediateExpiringCertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ "expiryPeriod": "30" }, output={ "status": true }, inputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificate, outputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all root and intermediate certificates nearing expiry are retrieved successfully for a valid request, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificate_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetRootIntermediateExpiringCertificate_Expiry_Date_10_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetRootIntermediateExpiringCertificate_Expiry_Date_10_Smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ "expiryPeriod": "10" }, output={ "status": true }, inputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificate, outputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that root and intermediate certificates expiring exactly 10 days from today are retrieved successfully, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificate_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetRootIntermediateExpiringCertificate_Expiry_Date_15_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetRootIntermediateExpiringCertificate_Expiry_Date_15_Smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ "expiryPeriod": "15" }, output={ "status": true }, inputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificate, outputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that root and intermediate certificates expiring exactly 15 days from today are retrieved successfully, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificate_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetRootIntermediateExpiringCertificate_Expiry_Date_30_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetRootIntermediateExpiringCertificate_Expiry_Date_30_Smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ "expiryPeriod": "30" }, output={ "status": true }, inputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificate, outputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that root and intermediate certificates expiring within the next 30 days are retrieved successfully, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificate_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetPartnerExpiringCertificateNegativeScenarios_Invalid_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetPartnerExpiringCertificateNegativeScenarios_Invalid_Token_Neg, endPoint=/v1/partnermanager/trust-chain-certificates, role=invalidtoken, templateFields=null, input={ "expiryPeriod": "30" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetRootIntermediateExpiringCertificateRootIntermediate/GetRootIntermediateExpiringCertificateRootIntermediate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving partner expiring certificates fails when an invalid token is used, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificateNegativeScenarios_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetRootIntermediateExpiringCertificateNegativeScenarios_Partner_Role_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetRootIntermediateExpiringCertificateNegativeScenarios_Partner_Role_Neg, endPoint=/v1/partnermanager/trust-chain-certificates, role=partnerftm, templateFields=null, input={ "expiryPeriod": "30" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetRootIntermediateExpiringCertificateRootIntermediate/GetRootIntermediateExpiringCertificateRootIntermediate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving root and intermediate expiring certificates fails when the user has an invalid or unauthorized partner role, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificateNegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartnerV2_All_Valid_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartnerV2_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all API keys are successfully retrieved for an authenticated partner using the V2 API with valid inputs, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_01, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Auth_Partner_Token_Smoke |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Auth_Partner_Token_Smoke, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that all API keys are successfully retrieved for an authenticated partner using a partner token, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Filter_ByPageNo |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_ByPageNo, endPoint=/v1/partnermanager/partner-api-keys/v2?pageNo=2&pageSize=4, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "2" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2PageNoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved for an authenticated partner when filtered by page number, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Filter_Expiry_Period_10_days |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_Expiry_Period_10_days, endPoint=/v1/partnermanager/partner-api-keys/v2?expiryPeriod=10, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved for an authenticated partner when filtered for keys expiring within the next 10 days, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_16, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Filter_Expiry_Period_15_days |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_Expiry_Period_15_days, endPoint=/v1/partnermanager/partner-api-keys/v2?expiryPeriod=15, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved for an authenticated partner when filtered for keys expiring within the next 15 days, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_15, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Filter_Expiry_Period_30_days |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_Expiry_Period_30_days, endPoint=/v1/partnermanager/partner-api-keys/v2?expiryPeriod=30, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved for an authenticated partner when filtered for keys expiring within the next 30 days, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Filter_Status_Activated |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_Status_Activated, endPoint=/v1/partnermanager/partner-api-keys/v2?status=activated, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved for an authenticated partner when filtered by status Activated, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Filter_Status_Dectivated |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_Status_Dectivated, endPoint=/v1/partnermanager/partner-api-keys/v2?status=deactivated, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved for an authenticated partner when filtered by status Deactivated, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Filter_apiKeyLabel |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_apiKeyLabel, endPoint=/v1/partnermanager/partner-api-keys/v2?apiKeyLabel=s, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved for an authenticated partner when filtered by API key label, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Filter_orgName |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_orgName, endPoint=/v1/partnermanager/partner-api-keys/v2?orgName=PMS, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved for an authenticated partner when filtered by organization name, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Filter_pageSize |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_pageSize, endPoint=/v1/partnermanager/partner-api-keys/v2?orgName=PMS, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved for an authenticated partner when filtered by page size, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Filter_partnerID |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_partnerID, endPoint=/v1/partnermanager/partner-api-keys/v2?partnerId=pms-111999, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved for an authenticated partner when filtered by partner ID, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Filter_policyGroupName |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_policyGroupName, endPoint=/v1/partnermanager/partner-api-keys/v2?policyGroupName=mosip, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved for an authenticated partner when filtered by policy group name, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Filter_policyName |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_policyName, endPoint=/v1/partnermanager/partner-api-keys/v2?policyName=mosip, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved for an authenticated partner when filtered by policy name, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Filter_sortFieldName_sortType_ASC |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_sortFieldName_sortType_ASC, endPoint=/v1/partnermanager/partner-api-keys/v2?sortFieldName=partnerId&sortType=asc&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved for an authenticated partner and sorted in ascending order based on the specified field, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Filter_sortFieldName_sortType_DESC |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_sortFieldName_sortType_DESC, endPoint=/v1/partnermanager/partner-api-keys/v2?sortFieldName=partnerId&sortType=desc&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that API keys are successfully retrieved for an authenticated partner and sorted in descending order based on the specified field, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_DevicePartner_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_DevicePartner_Token_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerdevice, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys fails when a device partner token is used instead of a valid partner token, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_02, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_FTMPartner_Token_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_FTMPartner_Token_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys fails when an FTM partner token is used instead of a valid partner token, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_03, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Filter_WithoutPageNo_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_WithoutPageNo_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?pageSize=4, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys fails when the page number is not provided, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_14, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Invaid_Role_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invaid_Role_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=admin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys fails when the user has an invalid role, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_13, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Invalid_apiKeyLabel_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_apiKeyLabel_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?apiKeyLabel=InvalidAPIKey, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2TotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys fails when an invalid API key label is provided, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_04, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Invalid_orgName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_orgName_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?orgName=%2APMS-1100, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys fails when an invalid organization name is provided, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_05, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Invalid_pageNo_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_pageNo_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?pageNo=-22&pageSize=2, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys fails when an invalid page number is provided, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_06, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Invalid_pageSize_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_pageSize_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?pageNo=1&pageSize=-1, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys fails when an invalid page size is provided, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_07, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Invalid_partnerID_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_partnerID_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?partnerId=%252APMS, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys fails when an invalid partner ID is provided, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_08, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Invalid_policyGroupName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_policyGroupName_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?policyGroupName=testmosip12121, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2TotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys fails when an invalid policy group name is provided, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_09, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Invalid_policyName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_policyName_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?policyName=testmosip1212, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2TotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys fails when an invalid policy name is provided, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_10, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Invalid_sortFieldName_1_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_sortFieldName_1_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?sortFieldName=_partnerID&sortType=asc&pageNo=1&pageSize=1, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys fails when the sort field name is set to an invalid value 1, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_12, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_Invalid_sortFieldName_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_sortFieldName_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?sortFieldName=MOSIP_PMS, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys fails when an invalid sort field name is provided, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_11, additionalDependencies=null |
| Messages |
| Testcase Name |
|---|
| Pms_GetAllApiKeyForAuthPartner_without_Authentication_Neg |
| Testcase Dependency |
| [] |
| Class Name |
| GetWithParam |
| Testcase Input |
| testCaseName=Pms_GetAllApiKeyForAuthPartner_without_Authentication_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Validate that retrieving API keys for a partner fails when authentication is not provided, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_01, additionalDependencies=null |
| Messages |